
Google to Replace SMS with QR Codes for Gmail Authentication
A Step Forward Google recently announced it will move from SMS to QR code-based authentication for Gmail accounts. This marks an important shift for cybersecurity, and further validation that companies and individuals are going to have to get beyond Traditional or Weaker security. But is this the best we can do? A Step Toward Stronger […]

The 2025 CrowdStrike Global Threat Report: Vishing and AI-Powered Cyber Attacks On the Rise
Cyber threats evolved rapidly in 2024, with attackers leveraging AI-driven social engineering, malware-free intrusions, and cloud-focused exploits. The newly released 2025 CrowdStrike Global Threat Report underlines critical shifts in cybercrime, particularly the surge in vishing (voice phishing) and identity-based attacks. Key Findings from the CrowdStrike Report 1. The Rise of Vishing: Voice Phishing Surges Fivefold […]

Security Doesn’t Matter
It’s About Your Bottom Line Let’s be honest—no one wants to talk about cybersecurity. It’s boring. It’s complicated. And for most business leaders, it’s an afterthought. What really matters? The bottom line. CEOs, CFOs, and decision-makers aren’t losing sleep over how many authentication factors their employees use. They’re worried about revenue, operational costs, and profit […]

AI vs. AI / Fighting AI with AI in Cybersecurity
The Rise of AI-Powered Cyber Attacks Cybercriminals are increasingly leveraging artificial intelligence (AI) to launch sophisticated attacks. From AI-generated phishing emails to deepfake social engineering scams, traditional security methods are struggling to keep up. To combat this growing threat, businesses must fight AI with AI, deploying advanced security solutions that detect, analyze, and neutralize AI-driven […]

Implementing MFA: Tackling Top Challenges for CISOs
What is the Biggest Issue CISOs Face When Implementing MFA? The biggest challenge for CISOs implementing Multi-Factor Authentication (MFA) is balancing security and user experience. Traditional MFA or 2FA methods, such as SMS-based codes or mobile authenticator apps, often lead to: Additionally, managing MFA across diverse applications and environments poses integration and scalability challenges, further […]

Lessons Learned in Cybersecurity in 2024 – to Help Build a Better 2025
Introduction As we wrap up another year, what lessons have we learned in Cybersecurity that will help us build a better 2025? One thing is certain, we saw progress in 2024. But, this is on both sides of the fence. While technological advancements delivered better cybertools, cybercriminals also grew more sophisticated and reminded us that […]

How to Phish-Proof Your Login
Across the Enterprise You’ve heard it before: Phishing is the #1 method used by cybercriminals to gain access to your digital valuables. Today, according to CSO Online, 80% of reported security incidents are caused by Phishing. We’ve also heard from CISA and others that MFA is the holy grail for cybersecurity. But then last week, […]

When Cybersecurity Gets Personal
I was a Victim of the Change Healthcare Breach -By Herbert Spencer – TraitWare Sometimes it’s frustrating being an innovator in cybersecurity. A few days ago, I received a letter from Change Healthcare, notifying me that my personal information had likely been compromised in a recent data breach – the one that affected millions of […]

Keep it Simple: Go Passwordless
People like Matt Topper are helping to spread the word. The story of the password is worth telling … again. Because P@$$w0rD$_suçK! Once upon a time, in 1961, man invented the Password for digital security. Back then, there was a thing called the “perimeter” where company digital assets resided. The password was the “key” that […]

Enterprise Cybersecurity: Practice vs. Risk
Are We Getting It Wrong? Due to the rising severity and frequency of cyber-attacks, Enterprise spending on cybersecurity is also rising worldwide. But debate is heating around which security methods we should employ. Where are organizations focusing their efforts, and where is the most risk? According to experts, companies may not be getting their priorities […]

Should Governments Require Stronger Security?
Rising cyber threats and incidents of cyber-attack across the globe have many calling for federal intervention to protect our digital valuables. What’s Happening … In recent news, the United Health Group (UHG) paid a $22 million ransom to the BlackCat ransomware gang for a late February cyber-attack on subsidiary Change Healthcare. The attack, which was […]

The Problem with Passkeys
There has been a lot of talk about Passkeys. Are they right for you and your company? Why the pushback? Let’s have a look. What are Passkeys? Passkeys are credentials that replace passwords, relying on public key cryptography based on the WebAuthN protocol. The public key is stored with the company that creates your account, […]