ExcaliburThe Keystone of Modern Authentication in a Zero Trust World part 2 — How Safe Is Your Smartphone?In our previous blog post, we delved into the pivotal role smartphones play in our daily lives, particularly highlighting their…Mar 6Mar 6
ExcaliburThe Keystone of Modern Authentication in a Zero Trust World part 1 — The Rise of the Smartphone as…In the current digital era, smartphones have established themselves as a pivotal component in the technological landscape. These devices…Jan 18Jan 18
ExcaliburDecoding the Okta Hack, Part 2: PAM’s Overlooked Role in Cyber DefenseWelcome back to Part 2 of our in-depth exploration into session hijacking, a critical security concern brought into sharp focus by the…Dec 4, 2023Dec 4, 2023
ExcaliburDecoding the Okta Hack, Part 1: PAM’s Overlooked Role in Cyber DefenseIn the ever-evolving landscape of cybersecurity, the latest Okta hack stands as a pivotal incident, highlighting critical vulnerabilities…Nov 24, 2023Nov 24, 2023
ExcaliburExcalibur’s journey from MFA to PAMExplore the rationale behind Excalibur’s leap from MFA to PAM.Oct 27, 2023Oct 27, 2023
ExcaliburHarnessing Virtues of the PAM Triad for Robust Digital SecurityIn the ever-evolving realm of cybersecurity, two key players stand firm to safeguard organizational assets: Privileged Access Management…Oct 10, 2023Oct 10, 2023
ExcaliburGuardians of the Cyber Realm: Unveiling Excalibur’s Arsenal in the Battle for Digital Security!In today’s blog post we again embark on a thrilling journey through the intricate landscapes of cybersecurity! With Excalibur as your…Sep 22, 2023Sep 22, 2023
ExcaliburBeyond Passwords: The Excalibur Vision for a Secure Digital FutureIn the ever-evolving landscape of cybersecurity, the age-old battle against unauthorized access continues. At the heart of this battle…Sep 15, 2023Sep 15, 2023