Trust is the currency of today’s digital economy. Businesses that earn and keep that trust, thrive – and those that don’t, struggle. With more than 5 billion users conducting their lives online, the opportunities for businesses to earn – and lose – trust are endless. In 2021, for the first time ever,...
In the latest "Proof of Concept," Lisa Sotto, Jeremy Grant and ISMG editors discuss the significance of Apple, Google and Microsoft supporting the FIDO protocol's passwordless sign-in standard, progress made on Biden's cybersecurity executive order and updates on U.S. cybersecurity and privacy laws.
A surprising improvement in loss ratios for cyber insurance providers in 2021 means the rapid rise in premiums might at last subside later this year. The loss ratio declined for the first time since 2018 despite the frequency and severity of claims filed for cyberattacks increasing again in 2021.
When acclaimed bank robber Willie Sutton was captured, a reporter inquired as to why he robbed banks. His simple answer was "because that's where the money is”. With advances in technology, it is plausible to “virtually” rob banks without involving weapons, but rather by a simple computer keystroke.
This...
In the coming weeks, U.S. President Joe Biden will announce a new executive order to prevent and detect identity theft involving public benefits. Jeremy Grant, coordinator of the Better Identity Coalition, discusses the challenges ahead for the government in combating criminal and identity fraud.
Establishing Zero Trust in hybrid cloud environments starts with strong access management. From multi-factor authentication to least privilege access, this eBook covers best practices for securing Identity in the cloud with CyberArk Identity Security Solutions and AWS IAM Solutions, including:-Single Sign-On (SSO) and...
As Russia's invasion of Ukraine continues, what should global CISOs and security teams do to ensure that their organizations stay protected? Beyond following cybersecurity agencies' guidance, experts offer advice on how to brief the board of directors, appeal for resources, support teams and more.
Emerging passwordless security standards, elevated consumer and consumer-like experience expectations, and ballooning costs have moved eliminating passwords from a theoretical concept to a real possibility. In this whitepaper, we will explore the case for going passwordless for both customer and employee...
On this week's "Sound Off," we ask John Kindervag, the founder of Zero Trust, for his reaction to the recently released Office of Management and Budget federal strategy to move the U.S. government toward a mature Zero Trust architecture.
Researchers report that because of increased use of multifactor authentication, attackers are developing phishing kits that steal tokens and bypass this trusted layer of security, enabling them to "man in the middle" a browser session and steal credentials and session cookies in real time.
Four ISMG editors discuss: how too many organizations fail to implement basic cybersecurity defenses - such as MFA; a proposed lawsuit against health insurer Excellus that calls for an improvement to its data security program; and strategies for securing open-source and other software components.
OMB on Wednesday released a federal strategy to move the U.S. government toward mature zero trust architectures. White House officials say the new strategy - with a focus on MFA, asset inventories, traffic encryption, and more - is a key step in delivering on Biden's May 2021 executive order.
With the explosion of ransomware and stampede of account takeover attacks, MFA has become the “go-to” solution, and a must-have if you want to renew your cyber insurance policy. But many MFA solutions rely on passwords and other “phishable” factors, that are easily bypassed by hackers. In this session, Roger...
Risk management is essential to the existence of every business. It requires organizations to consider which risks they can accept and which risks they can mitigate. But the problem with risk acceptance is that attackers are "actively looking for risks that you haven't mitigated that they're able to exploit," says...
When Lyndon Brown, chief strategy officer at Pondurance, discusses modern MDR, he frames the conversation around the evolution of incident response - both with a big "R" and with a small "r" - as well as who should now be providing this service.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.