A plastic card? A digital card? Or both?
The digital transformation has progressed rapidly during the pandemic, especially when it comes to issuing cards. For example, enterprise employees need an ID that will provide secure, seamless access into the office as well as online when working from home.
There’s no...
Zero Trust is not simply a different type of security technology or architecture; it is a methodology that provides a more comprehensive, dynamic and integrated approach to security. Cloud computing and software defined approaches along with maturity and interoperability across the technology ecosystem means Zero...
Virtually every organization and industry today is at risk of being targeted by a ransomware attack, and those attacks are more devastating than ever. 2021 has already proven this new reality with major events affecting Colonial Pipeline, DC Police, Kia Motors, Acer and Kaseya - just to name a few.
Unfortunately,...
You can't decrease the motivation of ransomware attackers. But you can curb their success by bolstering your own enterprise's approach to access, credentials and privileges. Morey Haber and James Maude of BeyondTrust share insights on ransomware defense.
Cyber criminals are opportunistic and merciless, targeting security vulnerabilities such as weak passwords or unnecessary administrator rights. The National Cyber Security Centre recently found that 23.2 million victim accounts worldwide used 123456 as the password, and many companies still provide full admin rights...
The Department of Defense did not effectively control access to the health information of high-profile personnel, says a new watchdog agency report, which hints that the findings also may indicate ineffective access control over other DoD employees' health records.
With more than 61% of breaches attributed to stolen passwords, a password manager can go a long way in helping enterprises enhance security, say Chandan Pani, CISO at Mindtree, and Lloyd Evans, identity lead, JAPAC, at LogMeIn.
As chief security scientist and advisory CISO to security vendor Thycotic, Joseph Carson is well aware of risks employees will take to get their jobs done. He's just authored a new ethical hacker's guide to help enterprises plug their holes - before their adversaries breach them.
Before the COVID pandemic forced most employees to work remotely, workforce identity security was already a big deal. Many industry analysts have long acknowledged that “identity is the new perimeter” alluding to the fact that business digitization, the transition of apps and infrastructure to the cloud, and the...
A compromised identity and its associated shared accounts are the single most
effective attack vector for a threat actor to compromise an entire multicloud
environment.
Download this whitepaper to learn how to protect your entire cloud environment, including:
Restricting the privileges any user, application,...
To enhance privileged access management for operational technology, organizations should use specialized remote access solutions for vendors that are allowed to access OT networks, says Felix Gaehtgens, an analyst at Gartner.
A panel of industry experts bring together the do’s and dont’s of a Privileged Access Management (PAM) journey. Based on real hands-on experience of PAM implementations and operations from a services perspective, features and functionality from a product perspective and business and compliance requirements from a...
Thycotic and Centrify recently merged to create a powerful new player in the privileged access management space. Art Gilliland, CEO of the new ThycoticCentrify, discusses this combined entity and the role it can play for enterprises small and large in ensuring cloud identity security.
From identity and access management to cloud migration and connected devices, retired RSA CEO Art Coviello looks beyond the pandemic and says, "It's going to be a Roaring '20s for technology." But he also foresees a potentially calamitous decade for security.
Today, many organizations rely on multiple cloud services with their end users regularly consuming dozens, or even hundreds, of different SaaS applications. This great cloud migration has successfully enabled the increase in remote working and is accelerating digital transformation initiatives. But, more clouds also...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.