Jun 14, 2018 It's been a while since my last newsletter, but I wanted to share about a new tool that I've been using a lot recently. I'll start by sharing that most of the people I know in the world of cybersecurity rightly focus on more deeply entrenched matters: server virtualization and containerization, software sandboxing, and training their staffs to avoid social engineering hacks. But there's one technology that we all continue to use that hasn't really evolved at all since the 1960's:
For your security, we need to re-authenticate you.
Click the link we sent to , or click here to log in.