The clear message from this year's Global Password Security Report is businesses still have a lot of work to do in the areas of password and access security.
Businesses are increasing their use of important security measures like multifactor authentication - but unfortunately employees still have poor password...
Identity Brings Access and Authentication Together.
In this guide, we specifically focus on evaluating and comparing identity solutions that combine Access technologies like Single Sign-On (SSO) and Enterprise Password Management (EPM) with Authentication technologies like Multifactor Authentication (MFA). When...
When it comes to security, an IT professional's job is never done. Whether it's upgrading old technology, keeping up with the latest threats or finding ways to more effectively train employees, IT teams have their work cut out for them.
In this report LastPass has collaborated with Vanson Bourne to present their key...
Strong identity and access management (IAM) is one key to preventing data breaches and limiting the blast radius should a security incident occur. But cloud IAM presents a new set of constructs for organizations to build and manage. Is cloud IAM the best identity and access control ever, or yet one more reason to tear...
Digital technology is already integrated - or in the process of being integrated - into every aspect of business, fundamentally changing how organizations operate. Digital transformation delivers new ways to solve problems, challenge the status quo and innovate with technology-driven strategies.
Today's companies...
A fully secure digital program considers both network and physical security, but that's not all. Employing a holistic approach also considers user convenience, risk mitigation, scalability and integration opportunities. Organizations whose IT and physical security teams collaborate can address the challenge of an...
Financial institutions are looking for new technologies that help innovate the workplace experience, increase customer convenience and differentiate from competitors. However, rapid innovation means they now face unprecedented threats to their image and reputation from security attacks.
Learn how the right security...
Your patients and members are today's consumers, and they expect seamless user experiences. But you can't meet their demands at the expense of security. You must remain a stalwart steward of protected health information (PHI) and personally identifiable information (PII). The distributed nature of healthcare delivery...
Valimail has been tracking the usage of Domain-based Message Authentication, Receiving, and Conformance (DMARC) across tens of millions of domains since early 2017. During that time, we've seen consistent growth in DMARC usage and its overall effectiveness.
Now, for the first time, the number of domains with DMARC...
Which entities will be custodians of our identities? David Birch of Consult Hyperion discusses why banks could be likely candidates for this emerging role.
The concept of "identity is the perimeter" is not new. However, COVID-19 has accelerated the transformation of workforce identity management, forcing organizations to navigate a new reality sooner than expected.
Whether or not they were prepared for it, more organizations are working remotely and utilizing SaaS...
Twitter says attackers who hijacked more than 130 high-profile Twitter accounts used social engineering to bypass its defenses, including two-factor authentication on accounts. Experts say companies must have defenses in place against such schemes, which have long been employed by fraudsters.
The Institute of International Finance, a global association of financial institutions, is focusing on strategies for using digital identification and machine learning to combat financial crime, says Matthew Ekberg, a senior policy adviser at the institute.
Music provides lessons on how to identify areas of normality and triage potential outliers. Mike Kiser of SailPoint Technologies explains how this can be applied to identity management.
Five billion unique user credentials are circulating on darknet forums, with cybercriminals offering to sell access to bank accounts as well as domain administrator access to corporate networks, according to the security firm Digital Shadows.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.