Research results from over 1,000 global key decision makers with visibility over access management confirm that security professionals are aware that a breach is only a matter of time, with 50% of respondents having already suffered a serious breach or expecting to experience one over the next six months (up from 42%...
The computer systems the U.S. Department of the Treasury uses to track the nation's debt have serious security flaws that could allow unauthorized access to a wealth of federal data, according to a pair of audits released this week by the Government Accountability Office.
The Q4 2018 Notifiable Data Breaches (NDB) report documents
262 data breaches in organisations across Australia. For those in the
financial services sector it paints an alarming picture: The number
of breaches is steadily growing - and compromised credentials
are the leading cause.
According to the LastPass...
Overall, Password Strength Scores follow the trends for Security
Scores: As companies get bigger, on average their Password
Strength Score goes down.
For businesses with fewer than 25 employees, the average total
Password Strength Score is 53. At more than 10,000 employees,
the average score drops to...
Multifactor authentication remains an industry best practice
for preventing unauthorized account access. Our analysis this
year found that, overall, 45% of businesses are using multifactor
authentication. This is a significant increase from last year's
24.5%. Encouragingly, more businesses are augmenting
The cyber security landscape been marred with big name and large-scale breaches: Cash Converters, Australian Defence, and Facebook, to name a few. Naturally, we expected to see an improvement in password behavior in the two years.
However, LogMeIn's new research revealed just the opposite. Password behaviors remain...
The explosion in the quantity and diversity of internet-connected devices - from industrial control systems and cars to farming equipment and refrigerators - makes applying privileged access management more important than ever, says Wallix Group's Chad Carter.
Identity and access management is more complicated when organizations rely on a cloud infrastructure, says Brandon Swafford, CISO at Waterbury, Connecticut-based Webster Bank, who describes the challenges in an interview.
Effectively managing privileged
accounts (sometimes called
superuser accounts) is becoming
more and more critical as security
and compliance emerge as
the driving forces behind most
IT initiatives. Unfortunately,
native tools and manual
practices for privileged account
management are proving to be
With major data breaches in the news and high-stakes security regulations in effect - including GDPR and the NIS Directive - CISOs worldwide are scrambling to comply with IT standards and avoid hefty fines. Privileged Access Management (PAM) streamlines compliance and overlaps with the requirements of many...
Companies are moving to the cloud in greater numbers than ever, targeting flexibility and access for their increasingly distributed workforces. But cloud migration of critical resources, even a portion for hybrid environments, presents serious security challenges and risks on many levels. The cloud is an attractive...
The NIS Directive, effective since May 2018, aims to standardize the security practices of Essential Services entities and their digital service providers to better defend against cyber attacks. Privileged Access Management (PAM) is a critical aspect of cyber defense, and responds to many of the NIS Directive's most...
What makes Industrial Control Systems (ICS) so vulnerable to cyber attack? How does this impact the wider enterprise? With IoT-connected equipment and remote management on the rise, security has never been so important. Privileged Access Management (PAM) secures and controls access to critical Industrial...
Two heavyweight cybersecurity regulations, ISO 27001 and the more recent GDPR, are major concerns for CISOs and IT teams worldwide. Conveniently for CISOs and IT teams, however, the two standards have much in common. Here we offer a cross-mapping of the security requirements of each regulation, and how PAM can help...
Despite increased use of two-factor authentication, single sign-on, and biometrics, passwords are still the most common form of authentication. However, when a significant percentage of breaches are caused by weak, stolen, or reused passwords, it's clear passwords pose significant risks that can't be ignored.