A multi-layered cybersecurity strategy
This case study details how an educational institution, early in its cloud journey, developed multi-layered cybersecurity approach to its primarily on-prem infrastructure. To secure access to cloud solutions for students, faculty, and staff, IT needed to add single sign-on to...
Keeping School Districts & Campuses Connected
Educational institutions have an opportunity to make learning more accessible than ever—but first, they must solve a technology problem. Many use outdated legacy identity systems with sprawling, open-source software. As a consequence, these institutions experience a...
“Work from anywhere” is a game changer, and it has significant impacts on certificate lifecycle management. Patrick Nohe of GlobalSign discusses the new, strategic approach security leaders need to take for CLM.
Digital transformation was real, and it had unseen influence on CLM, says Nohe, senior product...
A multi-layered cybersecurity strategy
Kingsborough Community College was early in its cloud journey, and developing a multi-layered cybersecurity approach to its primarily on-prem infrastructure. To secure access to cloud solutions for students, faculty, and staff, IT needed to add single sign-on to its toolkit.
Oakland County, Michigan, is one of the largest counties in the United States and according to the Center for Digital Government, it’s also one of the most technologically advanced. To get there, the county needed to re-architect an infrastructure made up of fractured, on-premises and cloud systems so that it could...
Keeping Campuses Connected
Colleges and universities have an opportunity to make learning more accessible than ever—but first, they must solve a technology problem. Many campuses use outdated legacy identity systems with sprawling, open-source software. As a consequence, these institutions experience a great deal...
The range of digital identities has evolved into four distinct categories. What role can automation play in managing them? Jason Soroko of Sectigo addresses these and other trends, including the future of passwordless authentication, during an interview with Information Security Media Group as part of ISMG’s RSA...
In order to give you a jump start on investigations in your own AWS environment, Expel has mapped the AWS services in which these tactics often originate (thanks, crafty attackers) along with the API calls the attackers make to execute on said techniques.
Download this guide for a breakdown of the most popular...
Fraudsters are taking advantage of the vulnerabilities of your multi-factor authentication methods, particularly SMS OTP. Get ahead of these bad actors by evolving your authentication using the newest MFA technologies, such as frictionless mobile authentication and real-time trust scoring. Read this white paper to...
The pandemic altered the security strategies and investments of organizations. All of a sudden the security teams were adapting to a workforce that was beyond traditional perimeters, working with new tools in new environments. Now that we are more than a year into remote work, can we say that we are now prepared for...
Phone-Centric Identity, also known as mobile identity, device intelligence, or phone intelligence, refers to technology that leverages and analyzes mobile, telecom, and other signals for the purposes of identity verification, identity authentication, and fraud prevention.
Download this whitepaper to learn more...
Security technology sprawl is a symptom,
and complexity is cybersecurity’s chronic
illness. Ashok Sankar of ReliaQuest shares
ways to manage this complexity and help
organizations rethink how they deploy and
measure their cybersecurity defenses.
In this eBook as part of ISMG’s RSA Conference 2021 coverage,...
With the rapid adoption of cloud services like Microsoft’s Office 365, and the distributed workforce, the risk of account takeover (ATO) fraud is increasing at alarming rates.
According to a recent Sift index, “ATO fraud attacks have especially spiked by almost 282% from the second quarter of 2019 until the...
Antivirus (AV) software has generally been regarded by businesses as the best and simplest defense to keeping data and systems secure. That somehow, it is nearly unconquerable. In reality, while AV products are certainly a must-have in your security solutions suite, they do not provide 100% protection against...
The road to cybersecurity compliance has changed dramatically in recent years, with proactive efforts such as incident response, forensic investigation and threat hunting on the rise.
However, compliance standards have typically not kept pace with the need for companies to level-up their security stance in an era of...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.