Over the past couple of decades we have seen the number of employees that work from home increase dramatically. Today, due to COVID-19 quarantine policies around the globe, many companies are faced with a new paradigm--employees must work from home for an undefined period of time.
At OneLogin, our primary focus is...
Web hosting giant GoDaddy confirms that a data breach has affected about 28,000 of its customers' web hosting accounts, according to a news report. The company has reset passwords and usernames for some customers as a precaution, although it says no data appears to have been altered.
As many IT teams work overtime to enable remote workers, maintaining security practices and compliance may not be top of mind, but threat actors are actively seeking opportunities to benefit from current circumstances.
Download this whitepaper to learn ways to reduce your attack surface, including:
Enforcing least...
The Financial Industry Regulatory Authority, a private organization that helps self-regulate brokerage firms and exchange markets in the U.S., warns that a "widespread, ongoing" phishing campaign is targeting its members.
An operational risk management framework should live at the core of every effective information security program and strategy. Rather than security professionals scrambling to secure every application and system with the highest grade of technologies and drowning their resources, risk management enables better...
Over the course of three days, ISMG and SecureAuth teamed up for a series of virtual roundtable discussions on the future of identity security. Bil Harmer of SecureAuth reflects on these discussions and how they inform his view of the factors influencing both the present and future of identity.
Done right, a zero trust architecture can reduce the complexity of one's environment while also improving cybersecurity protection and efficiency. Bob Reny of ForeScout focuses on three critical considerations: visibility, compliance and control.
A sophisticated, highly targeted phishing campaign has hit high-level executives at more than 150 businesses, stealing confidential documents and contact lists, says security firm Group-IB. The campaign, which targets Office 365 users, appears to trace to attackers operating from Nigeria and South Africa.
Four CISOs, two CEOs, one global crisis. These are the ingredients for an exclusive panel discussion on how enterprises have emerged from the cybersecurity challenges of COVID-19 and how they are building the foundation for an entirely new way to live and work post-pandemic.
Because the COVID-19 pandemic had led to more employees working from home, cloud services have become indispensable, but the pressure is on organizations to ensure security, says Jim Reavis, CEO of the Cloud Security Alliance.
The explosion of devices and communication channels in recent years presents government with a serious dilemma: How do agencies interact with citizens who increasingly rely on smartphones and tablets for public services? Currently, many agencies use outdated technology for their customer identity and access management...
CDO Technologies is charged with moving the entire Human Resources (A1) data center for the U.S. Air Force to the cloud, including 33 systems, 200 applications, and 5 million users. Due to their extensive experience, industry expertise, and proven capability, CDO chose Okta to assist with security, user experience,...
Enhance Security Posture for State and Local Agencies
Ransomware attacks on city, state and local governments are the latest cyberthreat to hit the headlines in force. From Atlanta to Baltimore to cities across Florida and Texas, these attacks present a significant and unique challenge for resource-strapped local...
Zero Trust security throws away the idea that we should have a "trusted" internal network and an "untrusted" external network. The adoption of mobile and cloud means that we can no longer have a network perimeter-centric view of security; instead, we need to securely enable access for the various users (employees,...
Identity and access management is a key foundational technology that can make or break a business' digital transformation initiatives. Identity ensures that digital interactions are secure and seamless across the enterprise, and a well-architected solution can boost workforce productivity, IT agility, and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.