It's a good time to be a CISO. You have the board's attention, and now you can use your position to ensure appropriate resources to tackle key challenges such as identity & access, cloud application security and third-party risk. Expel CISO Bruce Potter discusses how best to influence these decisions.
Google has removed more than 70 malicious Chrome extensions after researchers with security firm Awake Security discovered the extensions could be used to steal users' credentials and security tokens.
Organizations deploying deception technology must make sure to integrate it with other technologies to reap the full benefits of intrusion alerts, says Anuj Tewari, global CISO at IT Services HCL Technologies.
Digital transformation may have occurred over a weekend in March, but the effects will be felt - and secured - for years to come. How will global enterprises in 2021 validate identities, defend networks without perimeters and secure a permanent remote workforce? A panel of CEOs and CISOs shares strategies.
Consumers hate passwords, criminals love them. Most organizations today have an initiative to replace passwords with a modern approach that is both more convenient, and more secure. Completely eliminating password authentication across any channel and any device is a journey that takes time. Like major global...
Jeremy Grant, who led the public/private National Strategy for Trusted Identities in Cyberspace during the Obama administration, has spent more than two decades championing the cause of secure identity systems. Enter the COVID-19 pandemic, which created a remote workforce of unprecedented scale seemingly overnight....
This rising threat trend of remote work, along with the rapid growth of sophistication in malware, ransomware, DDoS and social engineering attacks has created a conundrum. How do we protect ourselves in an increasingly connected world? Nothing is completely unhackable, but there are a myriad of emerging technologies...
Why do so many enterprises remain chained to outdated and vulnerable identity and access management technologies - legacy systems that rely on passwords, eat budgets and kill productivity? Baber Amin of Ping Identity and Ramnath Krishnamurthi of LikeMinds Consulting preview a new virtual roundtable on Modernizing IAM.
As cyber and physical security continues to converge, a traditional siloed approach to workplace access can't keep up with the complex needs of today's banks and financial institutions.
Add in the additional complexities of the global pandemic, remaining competitive in the current climate has never been more...
As cyber and physical security continues to converge, a traditional siloed approach to workplace access can't keep up with the complex needs of today's banks and financial institutions.
Add in the additional complexities of the global pandemic, remaining competitive in the current climate has never been more...
The Gamaredon hacking group is now using a new set of malicious tools to compromise Microsoft Outlook as a way of sending spear-phishing emails to victims' contact lists, according to security firm ESET. This hacking group, which appears to have ties to Russia, has primarily targeted Ukraine for years.
Since the publication of the PSD2 directive, biometrics has played a key role to help financial services organizations carry out transactions with the highest level of security and a frictionless customer experience.
Biometrics allows compliance with this regulation while leaving behind other authentication methods...
Remote work is the new normal. In this new work-from-anywhere environment, how can IT leaders ensure always-on security while employees always have access to the business resources they need? IT needs to increase security to mitigate the risks associated with remote work, but to do so in a way that does not slow...
For an upcoming virtual roundtable, Alex Laurie of ForgeRock discusses the importance of digital identity management, the need for organizations to quickly and accurately register people, comply with privacy regulations and define and manage the level of risk involved.
Companies today, big and small, are facing the same challenges of managing and securing identities while accessing systems remotely or otherwise. Increased cyber attacks and distributed workforces are creating new challenges that need innovative solutions. When transitioning to a fully remote or hybrid workforce,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.