
Alina Sukhanova
Articles
-
Jun 11, 2024 |
securelist.com | David Emm |Dmitry Kachan |Alina Sukhanova |Georgy Kiguradze
Biometric scanners offer a unique way to resolve the conflict between security and usability. They help to identify a person by their unique biological characteristics – a fairly reliable process that does not require the user to exert any extra effort. Yet, biometric scanners, as any other tech, have their weaknesses.
-
Jun 10, 2024 |
securelist.com | Olga Svistunova |Dmitry Kachan |Alina Sukhanova |Kaspersky ICS CERT
IntroductionTwo-factor authentication (2FA) is a security feature we have come to expect as standard by 2024. Most of today’s websites offer some form of it, and some of them won’t even let you use their service until you enable 2FA. Individual countries have adopted laws that require certain types of organizations to protect users’ accounts with 2FA.
-
Jun 3, 2024 |
securelist.com | David Emm |Dmitry Kachan |Alina Sukhanova |Kaspersky ICS CERT
IT threat evolution Q1 2024IT threat evolution Q1 2024. Mobile statisticsIT threat evolution Q1 2024.
-
May 28, 2024 |
securelist.com | Cristian Souza |Eduardo Ovalle |Dmitry Kachan |Alina Sukhanova
IT outsourcing market continues to demonstrate strong growth globally – such services are becoming increasingly popular. But along with the advantages, such as saved time and resources, delegating non-core tasks creates new challenges in terms of information security. By providing third-party companies (service providers or contractors) with access to their infrastructure, businesses increase the risk of trusted relationship attacks – T1199 in the MITRE ATT&CK classification.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →