The problem with decentralized access management, says Manuel Garat, head of IAM at digital travel company Booking.com, is that while you might know who or what needs access to your network, applications and data, you "don't always know who shouldn't have access."
Many healthcare entities are resistant to implement multifactor authentication, and that is among the most frustrating critical security mistakes that organizations in that sector make, says Tom Walsh, founder of security consultancy tw-Security.
A plastic card? A digital card? Or both?
The digital transformation has progressed rapidly during the pandemic, especially when it comes to issuing cards. For example, enterprise employees need an ID that will provide secure, seamless access into the office as well as online when working from home.
What’s the ideal password policy?
Should you be emphasizing password length or complexity?
This guide will help determine a policy that’s strong enough to protect your business and thwart potential hackers, but not so complicated that employees will ignore it.
Download this guide and learn:
Why numbers and...
How many ways do U.S. businesses need to be told to lock down their systems to safeguard themselves from ransomware? That's the focus of a new, joint cybersecurity advisory from the U.S. government pertaining to BlackMatter, following an advisory issued last month about Conti.
Managing the balance between business innovation and operational needs, with enhanced cybersecurity risk management is creating a global ‘talent crunch.’ The scarcity of highly skilled cybersecurity resources, along with organizations looking to leverage Zero Trust, implement least privilege and just-in-time...
Criminal hackers don't break for lunches, weekends or holidays. Of course, that's just one of many challenges facing information security teams, as they attempt to maximize visibility and minimize complexity while protecting their business around the clock, says Peter Van Lierde, the CISO of energy firm Sibelga.
Four federal agencies have been awarded $311 million to bolster the U.S. government's cyber defenses and address IT modernization challenges, according to the interagency board of the Technology Modernization Fund, a federal funding source, which made the announcement Thursday.
The digital transformation occurring in healthcare has brought with it a wave of new information security and privacy considerations for hospitals and health systems and the technology companies that serve the industry. With third-party breaches at an all-time high, healthcare providers continue to increase their...
Customer authentication is a critical component of almost every application that exists because it serves as a product gateway impacting 100% of customers. While it is a standard feature, it is not easy to get right and the stakes for getting it right are higher than ever: 46% of customers abandon a transaction...
Microsoft has officially gone fully passwordless, allowing Windows users to replace their alphanumeric passwords with one of several substitute sign-in technologies to gain entry into a Microsoft product - a move received positively by industry insiders.
In the 20 years since the Sept. 11, 2001, al Qaida terrorist attacks on targets in the U.S., the need to shore up critical infrastructure and build resilience into systems remains a priority. But over the past two decades, concerns about physical threats have been displaced by cyber concerns.
Many employees are likely to begin looking for the flexibility and ease that remote work offers even as the pandemic wanes, turning many previously in-person government workplaces into hybrid ones.
As agencies begin to support a more permanent remote future, it’s critical that they build security in every step of...