Why are attacks so successful? Legacy endpoint security products are creating more problems than they solve. There is too much cost and complexity, defenses aren't keeping up, and security staff is stretched thin.
Silicon Valley employees are increasingly calling on executives to restrict the use of facial recognition technology, mobilized in part by the U.S. government's previous policy of separating children from parents at the border. Experts say facial recognition regulations are needed - and quickly.
Blockchain, the digital ledger used for cryptocurrency, can serve as an effective identity management platform, asserts Chris Boscolo, CEO of ZNO Labs, who describes an approach he calls "self-sovereign identity."
Traditional server security controls were not built for ransomware, cryptojacking and other modern attacks. Paul Murray of Sophos discusses deep learning, anti-exploit technology and other key elements of the new wave of server defenses.
Financial organizations currently subject to the FinCEN SAR eFiling will soon have to make major changes to comply with the new rules by January 1, 2019. The suspicious activity types that need reporting have been updated, new fields have been added, and the ASCII format is being updated just to mention a few things...
Timehop, the social media app that resurfaces older social media posts for entertainment, says its ongoing investigation has revealed that an attacker may have compromised more personal information than it previously suspected over the course of a breach that lasted at least seven months.
An Australian company that issues identity cards for access to airports has been notifying applicants and cardholders that their personal information may have been compromised, according to a news report. Australian federal police are investigating.
An ongoing security operations center challenge is trying to get the right data to the right person at the right time. The problem is compounded by there being "too much data and not finding the right people to deal with the data," says Mischa Peters of IntSights. What can help?
To better counter threats carried by content - email, attachments, files - Deep Secure's Simon Wiseman says organizations should investigate content threat removal, which involves extracting required data from content and discarding the rest.
Information technology and its use cases are constantly evolving. The challenge is undertaking security as intelligently as possible, using data-driven, risk-informed strategic occasions to apply resources efficiently and effectively.
The IT modernization effort taking root within the U.S Federal Government presents...
Adaptive authentication is a new approach to combatting fraud that achieves the twin goals of reducing fraud risk and preserving the customer experience.
Download this white paper and learn:
The characteristics and advantages of adaptive authentication;
How behavioral biometrics and mobile apps both play...
Identity and Access Management (IAM) is moving beyond IT security and compliance to become a valuable enabler that drives business performance, digital transformation and competitive advantage.
Making your IAM program a success is not rocket science. But following the guidance provided in this paper will help you...
In the real world, governance is a major challenge. In fact, governance can't even be considered until access, security, control and management have been achieved.
If simply provisioning access is difficult, leveraging that access to enable business agility - the goal of governance - is impossible. If all your time...
Security concerns and compliance make the need to manage access a top priority. The foundation for everything is access.
In this e-book, you'll discover access management best practices and foundational concepts, including:
Today's key challenges for effective access management;
The most common identity management...