Issues with passwords are legion: too many to remember; inherent security weaknesses, and inconvenience, but while many look forward to the day when passwords are no more, for now they are ubiquitous because they are useful, and one of the best ways to enhance their security is through the use of a password manager.
Identity and access management has not been easy for security practitioners, and managing IAM governance is a tougher problem. Shane Read of Hex Trust, Mark Frogoso of Mynt (Globe Fintech Innovations, Inc.) and Varun Kakkar of Tricor Group share tips on IAM governance, including the need for a top-down approach.
How PAMaaS helps improve security while lowering total costs.
No one wants to end up on the news because they were breached – yet many businesses are prime targets for hackers or malicious insiders because they have a hard time maintaining their privileged accounts. This webinar brings together thought leaders to...
Businesses have embraced zero trust architectures in an effort to increase their protection while reducing cost and complexity for the organization, according to iboss CEO Paul Martini. Martini says companies are turning to zero trust to more effectively protect their users, applications and data.
With the ongoing pandemic driving digital transformation and hybrid work, it's no surprise that the theme of this year's RSA Conference was "transform." Carrying forward that theme, RSA CEO Rohit Ghai says that channeling "disruptive forces at play" can be a powerful tool for driving needed changes.
Companies need better visibility into their ever-changing distributed environments "like never before," says Mike Kiser, director of strategy and standards at SailPoint. He discusses cloud governance, digital transformation and identities, and the importance of transparency in automation.
For CISOs, it's critical to not implement security without first carefully considering the user's experience, says Bernardo Vasquez, advisory CISO in the strategic client practice of Palo Alto Networks. He explains why and discusses other topics, including ZTNA 2.0.
In the wake of digital transformation and President Biden's 2021 cybersecurity executive order, an entire industry has sprung up around the concept of Zero Trust. John Kindervag, the researcher who created the architecture, weighs in on how the discussion has evolved.
Michael Lines is working with ISMG to promote awareness of the need for cyber risk management, and the CyberEdBoard is posting draft chapters from his upcoming book, "Heuristic Risk Management: Be Aware, Get Prepared, Defend Yourself." This chapter - the last in the series - is titled "Building an Effective Defense."
Atlassian has issued a patch for its Confluence workspace collaboration tool, which is being targeted in the wild with a zero-day vulnerability that gives attackers unauthenticated remote code execution privileges. The vulnerability has a CVSS score of 10 out of 10 for criticality.
A zero-day vulnerability in Atlassian Confluence, a workspace collaboration tool that serves millions of daily active users, is being targeted in the wild. The flaw, according to the company's security advisory, gives attackers unauthenticated remote code execution privileges.
Lookout has bought password management provider SaferPass to provide carriers distributing the company's consumer app with more capabilities in a single place. Lookout wants to take SaferPass's technology beyond its existing base of consumer and SMB customers and bring it to large enterprises.
Memo to IT administrators: Don't store data in cloud in an unsecure manner. Security researchers at Secureworks have found more than 1,200 cloud-based, unsecured Elasticsearch databases that attackers wiped, leaving only a ransom note demanding Bitcoin in return for their restoration.
Gartner predicts that 60% of enterprises will phase out their VPNs in favor of a ZTNA security solution by 2023. Don’t leave your security behind. Discover 7 convincing reasons to ditch your legacy VPN for ZTNA or risk leaving your network vulnerable to external attacks. Move past the limitations of a VPN.
Get...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.