Hacking Humans – An MFA Challenge

Hacking Humans – An MFA Challenge

Multi-factor authentication (MFA) has long been seen as a strong defense against unauthorized access. But attackers have learned to exploit the weakest link in the chain: human behavior.  Social engineering tactics have grown more sophisticated, rendering MFA systems...
Skjaldtorg: Iceland’s Cybersecurity Meetup

Skjaldtorg: Iceland’s Cybersecurity Meetup

Date: September 12, 2024 Time: 16:00 – 18:00 Location: Bullseye 🎯, Snorrabraut 37, 105 Reykjavik It’s time for an informal Icelandic forum for cybersecurity. We are pleased to announce Skjaldtorg: Iceland’s Cybersecurity Meetup, aimed at professionals...
How MFA Misconceptions Enable Lateral Movement

How MFA Misconceptions Enable Lateral Movement

For all its merits, over reliance on Multi-Factor Authentication (MFA) has become a real security problem. Like all security controls, MFA suffers from limitations, but unlike most security controls, MFA’s limitations are less well understood by security teams, which...
Keystrike is Now SOC 2 Compliant

Keystrike is Now SOC 2 Compliant

At Keystrike nothing is more important to us than customer success, and success is built upon trust. In order to help our customers secure remote desktop connections, we must have stringent security practices internally. To demonstrate our commitment to the highest...