Thoma Bravo has begun interviewing underwriters as it explores an initial public offering for SailPoint, Bloomberg reported last week. The private equity firm hasn't finalized details, including the timing of a potential listing for the identity governance and administration vendor.
Authentication requiring stored credentials is not only vulnerable to phishing and other compromises, but using these credentials can also be cumbersome for busy clinicians, said Tina Srivastava, co-founder of Badge, a provider of deviceless, tokenless authentication technology.
ColorTokens purchased PureID, expanding its zero trust framework with identity-based segmentation for cloud and hybrid environments. The acquisition focuses on securing cloud applications, microservices and APIs through advanced identity-based authentication.
As cloud adoption accelerates, the unchecked growth of nonhuman identities is exposing companies to increased risks. Adam Cheriki, CTO and co-founder of Entro Security, explains why securing these identities is crucial and how the company's platform delivers a comprehensive solution.
In today’s rapidly evolving digital landscape, legacy identity security systems are struggling to keep up with the scale, diversity and pace of change. These outdated systems not only hinder agility but also burden organizations with high infrastructure costs. Discover how integrating advanced identity security...
Join this panel of experts from AWS, Accenture and CyberArk, as they share their advanced experiences and discuss navigating the intricate landscape against evolving cyber threats and how every identity, both human and non-human needs the right level of intelligent privilege controls to be secure.
An Arizona-based technical school is notifying nearly 209,000 current and former students, parents and faculty that their personal, health and financial information was potentially compromised in a LockBit attack earlier this year. The ransomware hack is one of many hits in the education sector.
The theft of terabytes of Snowflake customers' data through credential stuffing hacks highlights how multifactor authentication shouldn't be optional for safeguarding accounts. Experts are calling on providers to build in more robust identity and authentication security features, at no extra cost.
Security researchers identified an attack method against a commonly used network authentication protocol that dates back to the dial-up internet and relies on an obsolete hashing function. Researchers say "a well-resourced attacker" could make it practical.
In the wake of multiple customers of Snowflake collectively losing terabytes of data to attackers, the cloud-based data warehousing platform has rolled out a swath of cybersecurity improvements, including allowing administrators to make multifactor authentication mandatory for all users.
The Monetary Authority of Singapore said banks will phase out one-time passwords for bank account logins over the next three months for customers who use digital tokens to authenticate their identity. The move follows a rise in phishing scams that impersonate banks in messages to steal credentials.
Brent Deterding, CISO at Afni, explained why simple security measures, such as YubiKeys and domain joins, can effectively neutralize sophisticated AI-driven attacks. He also discussed leadership in cybersecurity and the role CISOs play in determining materiality for SEC reporting.
Cybercrime is not just a threat; it's a trillion-dollar industry that's outpacing the global trade of illegal drugs.
This infographic breaks down the economics of cybercrime and underscores the critical need for an identity-first security strategy, including:
Percentage of recent attacks involving AI;
The...
The world is digital. It’s how we work now. That workforce is no longer just human users – employees, contractors, and vendors – but also bots or service accounts, each having their own set of access requirements, restrictions, and locations.
Additionally, there are applications and data spanning cloud,...
Non-employee access poses a significant security risk, with 51% of organizations admitting to inappropriate access assignments.
This infographic outlines the challenges and solutions for managing third-party identities, including:
An Automated Approach to Onboarding;
Verifying and Terminating Access for...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.