Digital identity is coming of age as a way to enable COVID-19 contact tracing, crack down on payment fraud and much more, says Tony Craddock of the Emerging Payments Association.
U.S. federal agencies operate some of the world's largest and most complex digital networks, but many of them rely on older, legacy technology for critical operations. Add to this the fact that the federal government is highly targeted by nationstate adversaries and traditional criminals alike, and the need for...
The FBI is warning organizations in the financial sector about an increase in botnet-launched credential stuffing attacks that are leading to the theft of millions. Many of these attacks, which target APIs, are being fed by billions of stolen credentials leaked over the last several years.
Shopify's announcement this week that two employees inappropriately accessed transactional data from 200 of the merchants that use its e-commerce platform demonstrates the importance of taking a "zero trust" approach to security and improving identity and access management capabilities, security experts say.
A bipartisan bill looks to take some initial steps toward creating nationwide digital identity standards that can address a range of security issues, including theft and fraud stemming from data breaches. The legislation is backed by the Better Identity Coalition.
Few organizations can support breach defense, secure DevOps, guard the privacy of individuals and their data, and enable compliance with worldwide regulations at enterprise scale. This infobrief explores a broad set of integrated security, risk, and governance solutions which can enable these capabilities for your...
While nearly three-quarters of cybersecurity professionals would grade their organization's
ability to identify and mitigate a cyberattack, as above average or superior, nearly half have
been subject to a spear-phishing attack and a third have suffered a malware incident in the
last year. Further, over half of...
Increasingly, cyber attacks are taking advantage of privileged accounts, and traditional PAM controls are not enough to defend against them. Tim Keeler of Remediant discusses the role of Zero Standing Privilege and just-in-time privileged account defense.
The emerging cloud-delivered service model known as security access service edge, or SASE, is designed to help simplify security for remote access, says Sean Duca of Palo Alto Networks, who explains how the model works.
An expired digital certificate for Quest Diagnostics, a major test provider, and several technology woes temporarily prevented the state of California from receiving timely COVID-19 lab test data, resulting in an inaccurate tally of cases.
Suddenly, onboarding, servicing and securing digital accounts with advanced authentication techniques isn't just a priority for global enterprises; it is the priority. Dean Stevenson of HID Global previews an upcoming virtual roundtable discussion.
Valimail has been tracking the usage of Domain-based Message Authentication, Receiving, and Conformance (DMARC) across tens of millions of domains since early 2017. During that time, we've seen consistent growth in DMARC usage and its overall effectiveness.
Now, for the first time, the number of domains with DMARC...
Your patients and members are today's consumers, and they expect seamless user experiences. But you can't meet their demands at the expense of security. You must remain a stalwart steward of protected health information (PHI) and personally identifiable information (PII). The distributed nature of healthcare delivery...
Which entities will be custodians of our identities? David Birch of Consult Hyperion discusses why banks could be likely candidates for this emerging role.
As we begin the second half of 2020, organizations must find ways to ensure their customers can engage with services at any time, from any device, securely. Enter: Customer identity and access management. In a preview of an upcoming roundtable, Okta's Keith Casey discusses CIAM maturity.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.