ScirgeDetecting Phishing Attacks with Shadow IT DiscoveryPhishing attacks need no introduction, so we will skip the part where we discuss how relevant and scary they are. They often come in pair…4 min read·Jan 14, 2022----
ScirgeHow to Protect Microsoft Active Directory Passwords?Even though Microsoft has ranted about passwords being irrelevant, they do provide different levels of protection for maintaining password…5 min read·Nov 3, 2021----
ScirgeCloud Security Trends Versus RealityIn the cutting-edge world of data, visibility into cloud and SaaS usage has been one of the hottest trending topics amongst vendors and…5 min read·Jun 7, 2021----
ScirgeThe Password Security ConundrumPassword strength requirements have been around since the early 2000’s. Although they are one of the rare guidelines outwardly regretted by…5 min read·May 6, 2021----
ScirgeAnatomy of Account Takeover AttacksAccount takeover (ATO) describes a scenario where user accounts and password integrity have been compromised, enabling a third party to…7 min read·Apr 26, 2021----
ScirgeAnatomy of Credential Stuffing AttacksCredential stuffing is the automated injection of usernames and passwords — usually generated from security breaches — to access various…6 min read·Mar 16, 2021----
ScirgeRecord Number Of Account Leaks In 2020Due to the global pandemic, most of our lives and livelihoods have shifted online. While convenient, this increase in remote work has had…5 min read·Jan 15, 2021----
ScirgeSecure Browsing for the EnterpriseSecure browsing is often defined by crucial requirements like protecting one’s privacy, browsing history, and PII. It involves protection…4 min read·Nov 13, 2020----
ScirgeShadow IT: What It Is And Why It Is An Alarming Security Concern For Every OrganizationPost-breach investigation reports like those from IBM and Verizon agree that for the past several years, around one third of all…8 min read·Sep 22, 2020----
ScirgeCredential Stuffing in the Media Industry aka. “date-night offers”Credential stuffing is one of the most prominently-used attack vectors. The Media Industry is heavily targeted based on the latest reports.3 min read·Jul 19, 2020----