CMS Critic Logo
  • Articles
  • Products
  • Critics
  • Programs
Login Person Icon

security Article

Login Person Icon
Home
Articles
Products
Likes

News

Skeleton key next to a digital keyhole
Security

When Passwords Become Skeleton Keys: The North Face Breach and the Perils of Credential Stuffing

Password reuse is the internet's dirty little secret, and hackers are having a field day with credential stuffing. Here are some simple strategies that CMS and DXP vendors and their customers can employ to help break the cycle.

Jurgita Lapienytė, chief editor at Cybernews

Digital padlock in the middle of a digital landscape.
Security

Make Sure Your Vendors and Partners aren’t a Security Risk with Third-Party Security & Compliance Audits

nazy profile image
An illustration of a digital cybersecurity shield with connected lines shooting out from its center, with the letters "AI" within the shield.
Security

Not Every AI is the Same: A Guide to Responsible and Secure AI in CMS

matej profile image

New Linux Malware Targets Plugins to Backdoor WordPress CMS Websites

mk-patterson Profile
Review

Netsparker Review: Web Application Security and Vulnerability Scanner

paris-tuzun Profile

How to Secure a Website in 5 Steps

mike-johnston Profile
Wistia logo

Give your audience the best video experience

Composite illustration of a video player with a dropdown menu for different playback options
Sign up for free
Items per page:
Page 1 of 1