"Zero Trust" security is rapidly transitioning from a marketing buzzword to a practical methodology for protecting today's global networks. Stan Lowe, global CISO of Zscaler, shares his 2020 vision for zero trust.
Delayed enforcement of the "strong customer authentication" requirements for online transactions under the European Union's PSD2 regulation is hampering efforts to enhance security. That's why the European Banking Authority should act quickly to develop a new timeline.
The Q4 2018 Notifiable Data Breaches (NDB) report documents
262 data breaches in organisations across Australia. For those in the
financial services sector it paints an alarming picture: The number
of breaches is steadily growing - and compromised credentials
are the leading cause.
According to the LastPass...
The cyber security landscape been marred with big name and large-scale breaches: Cash Converters, Australian Defence, and Facebook, to name a few. Naturally, we expected to see an improvement in password behavior in the two years.
However, LogMeIn's new research revealed just the opposite. Password behaviors remain...
Currently, nearly ninety percent of organizations worldwide are using
Active Directory (AD) for on-premises
resources (aka on-prem). That
represents 500 million organizations
and somewhere around 10 billion daily
authentications. In fact, in the world
of identity and access management
(IAM), AD has become...
Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware!
Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, for this webinar...
Digital transformation (DX) continues to drive growth across financial services firms, creating new opportunities to increase revenue and foster innovation. Cloud - whether public, private or a hybrid approach - is foundational to achieving DX objectives, as is secure, resilient and scalable network connectivity....
Email is indispensable to financial services. It's also so ubiquitous throughout society that most people take for granted that every email sent will be received almost instantaneously.
This guide shares insights on what is really happening behind the scenes with the industry's most used form of communication, ways...
Radio controllers used in the construction, mining and shipping industries are vulnerable to hackers, Trend Micro says in a new report. To address the issue, researchers say, manufacturers need to move away from proprietary communication protocols and embrace secure standards, such as Bluetooth Low Energy.
Account takeover is a rapidly growing arena for
cybercriminals. How can organizations strengthen
both authentication and authorization?
Download this white paper to learn more about:
Why account takeover fraud is a growing and strengthening problem;
How organizations can strengthen authentication and...
The digital revolution has given healthcare organizations new tools to increase team efficiency and improve their customer experience. But it's also opened up new vectors that cybercriminals can use to attack. As your attack surface expands to web infrastructure that you don't own or control, it becomes increasingly...
Email security in the era of the cloud is a critical concern for business leaders. This tool is a powerful way for businesses and services to communicate with their customers. From transaction notifications to billing statements to social media updates, email is a proven reliable and effective way for businesses to...
As organizations are seeing higher numbers of people working remotely, including parts of their IT team, the need for stronger endpoint management is even more important. Automating routine tasks can also be great for business as it drives key business growth by increasing productivity through the automation of of...