In May, The White House released an executive order on improving the nation’s cybersecurity. The order came with various directives for Federal Civilian Executive Branch agencies. Among other efforts, the order focused on the federal government’s advance toward zero trust architecture (ZTA). It framed this journey as one “which shall incorporate, as appropriate, the migration…

Cybercriminals Are Getting Better at Using Advanced Authentication Methods

Cybercriminals are learning how to use newer authentication methods to exploit security weaknesses. As always, it is a cat-and-mouse game with serious consequences. Facial recognition software can be exploited with high-definition photos, many of which can be found on social media accounts. Fraudsters can easily bypass one-time passwords by calling cellphone companies and impersonating the…