Managing today's hybrid work environment is challenging, but securing that environment is equally important - and difficult. Ultimately, you need to connect your users to the right technology at the right time, in a secure way. To know that you're giving the right people access, you first need to have a way to know...
This report analyzes the current state of password security, access, and authentication globally and steps companies are taking to increase their security scores. Organizations are making notable strides in password and access security - but there is still a lot of work to be done.
Download this report to learn:
Twitter says it has fixed an API problem that would have allowed someone to match phone numbers en masse to corresponding accounts, which could potentially unmask anonymous users. The flaw could have been found and exploited by state-sponsored actors, the social media firm warns.
State and local government networks contain sensitive data from millions of people and businesses, making them an attractive target for attackers. With the increasing sophistication of cyber attacks and the lack of resources at their disposal, IT departments across these agencies must quickly secure a variety of...
Apple previously scuttled plans to add end-to-end encryption to iCloud backups, Reuters reports, noting that such a move would have complicated law enforcement investigations. But the apparent olive branch hasn't caused the U.S. government to stop vilifying strong encryption and the technology giants that provide it.
In light of rising tensions between the U.S. and Iran, the Association of Executives in Healthcare Information Security recently issued new data security guidance to help the healthcare sector prepare for potential nation-state attacks, says CISO Christopher Frenz, one of the document's authors.
Proof-of-concept code has been released to exploit a severe Citrix vulnerability present in tens of thousands of enterprises. Citrix says it's developing permanent patches but that enterprises should use its mitigation guidance. In the meantime, attackers are hunting for vulnerable machines.
Adopting the policies in NIST 800-171 brings multiple security-related benefits, including best practices for data access policies, reduced risk of data breaches and insider threats, and a scalable approach to protecting sensitive data.
An advanced persistent threat espionage campaign with suspected ties to the Chinese government quietly targeted businesses and governments in 10 countries for two years, bypassing two-factor authentication, according to a report by Fox-IT.
Modern two-factor solutions support new, complex technology models changing how we use data, including cloud computing and BYOD (Bring Your Own Device).
With the large diversity of vendors, it's easy for IT security decision-makers to get confused about which solution is right for your agency.
To help enhance security, Firefox extension developers will be required to set up their accounts to support two-factor authentication beginning early next year, Mozilla, the open source community that supports the browser, has announced.
One of the largest fines to date for violating the EU's General Data Protection Regulation has been announced by Germany's federal privacy and data protection watchdog, the BfDI, against 1 & 1 Telecommunications, in part for inadequate authentication mechanisms. The company plans to appeal.
Multifactor authentication is gaining traction - but it also is causing additional user friction when deployed poorly. No matter whose research you cite, a startling high percentage of recent breaches are the result of stolen or weak credentials. Yet, enterprises still struggle to take advantage of multifactor...
Twitter users no longer have to supply a phone number in order to use two-step verification for authentication. The move will better protect accounts from SIM hijacking attempts and also means users don't have to sacrifice some of their privacy to enable a security feature.