The Essential Eight is a prioritised list of core mitigation strategies developed by The Australian Cyber Security Centre (ACSC) to assist organisations in protecting their systems against a range of attacks. The Australian Signals Directorate (ASD) considers the Essential Eight as one of the most effective defence...
With so many cybersecurity technologies and services available, how do organizations get started with evaluating the managed detection and response option that is right for them? Lyndon Brown of Pondurance weighs in on how to select the MDR provider that fits your needs best.
Successful account takeovers are one of the most common ways that organizations end up with attackers in their systems. But strong authentication can thwart even the most clever phishing campaigns, says Brett Winterford, regional chief security officer for APJ at Okta.
The divide between mobile app detection and IAM has fueled cyber incidents and breaches as remote work has expanded. Workers using personal smartphones don't want to install corporate endpoint management products but still need to ensure both user and device are protected, says RSA CEO Rohit Ghai.
As the world transitions into a more permanent hybrid workforce, the flexibility it brings results in both benefits and challenges for employers and workers. Whether your team is working in the office, remotely, or something in-between, you don’t need to compromise your security to gain more flexibility. Join Cisco...
In the wake of President Biden's 2021 executive order, security leaders across sectors are now seeking phishing-resistant multifactor authentication. But what exactly is it, and how is it best deployed? Yubico's Derek Hanson outlines a mature approach to MFA.
In this video interview with Information Security Media...
“MFA blocks 99% of attacks” until it doesn’t. An outdated MFA is a clear and present danger. In this webinar with Roger Grimes, author of “Hacking Multifactor Authentication”, we’ll enumerate the multiple vulnerabilities with existing “phishable” MFA; and the TTP’s hackers are employing to bypass the...
In Part 3 of a three-part video series, CyberEdBoard member Andrew Abel, a cybersecurity and zero trust consultant, and Chase Cunningham, CSO at Ericom Software, describe the operational and business benefits of creating an identity strategy.
It's no secret: As pharmaceutical companies develop new health treatments, adversaries seek to steal or sabotage their intellectual property. This dynamic adds extra urgency to authentication. Tom Scontras of Yubico talks about how the pharma sector approaches authentication.
Security and ease of use: It is one thing for nonhealthcare entities to debate these merits of new authentication in solutions. But in healthcare, where the decisions directly affect patient safety, the stakes are critical. Tom Scontras of Yubico talks about how healthcare approaches authentication.
In the latest weekly update, ISMG editors discuss the implications of the former Uber CSO's guilty verdict for the rest of the industry, the growing problem of keyless car theft, and the latest progress toward a passwordless future revealed at the annual FIDO Alliance conference.
Organizations can improve security with modern authentication protocols, but the big message to the marketplace is that FIDO Passkeys give customers more convenience and deliver a consistent user experience, according to panelists on the final day of FIDO Alliance's Authenticate 2022 Conference.
In Part 2 of this video series, CyberEdBoard member Andrew Abel, a cybersecurity and zero trust consultant, and Chase Cunningham, CSO at Ericom Software, explain why organizations need to think about identities in the context of humans and nonhumans, their roles and their risks.
Multifactor authentication needs to move away from one-time passwords sent via text message and embrace modern standards that prevent man-in-the-middle attacks. Plus, excessive identity challenges online lead to 20% of e-commerce transactions being abandoned, say experts at Authenticate 2022.