There's a lot of hype around Zero Trust security, but it's proving to be more than just theory.
In this brief, we review the key takeaways from our recent webinar Zero Trust in Practice, including how to align trust with context, the key pain points Zero Trust can address, and the steps to get to a Zero Trust...
Consumers hate passwords, criminals love them. And while the journey to passwordless authentication takes time, there are lessons to be learned from major global organizations who have started down the path. Dr. Rolf Lindemann of Nok Nok Labs shares insights.
The secure access service edge model, or SASE, treats identity as the new perimeter, says Lee Dolsen Singapore-based chief architect for Zscaler in the Asia Pacific region, who offers implementation insights.
Recent hacking incidents, including one targeting Twitter, are raising awareness of the importance of privileged access management, says David Boda, group head of information security for Camelot Group, operator of the U.K. National Lottery. He describes PAM best practices.
The latest edition of the ISMG Security Report features a discusssion with Equifax CISO, Jamil Farshchi, on the lessons learned from the credit reporting firm's massive data breach three years ago. Also featured: Australians' driver's licenses leaked; privileged access management tips.
This session is dedicated to our UK, EU and ME audiences and will provide practical steps to enable organisations to successfully implement a strategy of least privilege. Least privilege will allow you to eliminate unnecessary risk by elevating rights across multi platforms and networked devices without hindering...
The new work reality has created a change in how information is accessed and used, and attackers are targeting remote users with increasing frequency and efficiency. This has brought on a new shift in the IT paradigm which requires identity to act as the central control point in defining an enterprise security...
You know securing privileged access is a must, but where do you even begin?
Thycotic's live expert session is a must for teams launching PAM (Privileged Access Management) initiatives to start on the right foot. As you progress on your PAM journey, there's always something new to learn. If you've already begun...
The latest edition of the ISMG Security Report analyzes why ransomware gangs continue to see bigger payoffs from their ransom-paying victims. Also featured: Lessons learned from Twitter hacking response; security flaw in Amazon's Alexa.
The emerging cloud-delivered service model known as security access service edge, or SASE, is designed to help simplify security for remote access, says Sean Duca of Palo Alto Networks, who explains how the model works.
Chaos ensued when miscreants interrupted a virtual bail hearing on Wednesday for the suspected Twitter hacker, hijacking the feed with screams, chatter and, for a few brief seconds, pornography. The meeting details were public, and the meeting had not been password protected.
A new study finds access control infrastructure is deteriorating, as is the confidence that the access control systems in place are up for the job. These findings come from a survey of ASIS International members and customers on access control technology and its use.
The study underscores the complexities of...
Twitter says attackers who hijacked more than 130 high-profile Twitter accounts used social engineering to bypass its defenses, including two-factor authentication on accounts. Experts say companies must have defenses in place against such schemes, which have long been employed by fraudsters.
Two recent Department of Homeland Security advisories pertaining to vulnerabilities in certain ultrasound systems from a major medical device maker - and multiple flaws in an open-source hospital information management system - highlight the range of security risks spanning various segments of the healthcare sector.
Financial services organizations today face extraordinary challenges in a dynamic, complex landscape. During the past two decades, the financial services sector has seen everything from increasing cybersecurity threats, data breaches and cyberattacks to intensified regulatory compliance, an acceleration of digital...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.