Life comes at you fast, especially when you're a breached business such as Okta, which may have exposed customer data or otherwise put the businesses paying for your product at risk. Here's how after detecting the breach, Okta fumbled its response, and what others should learn from this experience.
Okta says it should have notified customers of a breach earlier and that Lapsus$ compromised a laptop belonging to Sitel, a third-party customer support firm, via remote desktop protocol, enabling it to infiltrate Okta's network. Cybersecurity experts discuss the impact of the breach and offer mitigation advice.
In the coming weeks, U.S. President Joe Biden will announce a new executive order to prevent and detect identity theft involving public benefits. Jeremy Grant, coordinator of the Better Identity Coalition, discusses the challenges ahead for the government in combating criminal and identity fraud.
This report analyzes how sanctions levied against Russia and Belarus for the invasion of Ukraine are affecting security researchers in those countries who participate in bug bounty programs. It also examines lessons to be learned from data breaches and developments in passwordless authentication.
In the new "Proof of Concept," John Kindervag, Zero Trust creator and senior vice president of cybersecurity strategy at ON2IT, and Jeremy Grant, managing director of technology business strategy at Venable, join ISMG's Anna Delaney and Tom Field to discuss trending Zero Trust and identity issues.
Older consumers are considered a more vulnerable population. They are the best kind of customers, and cybercriminals know that. They are known for having better credit and more funds, tend to be more trusting, and lack familiarity with new digital technologies. Fortunately, there is a way to help financial...
Zero trust, identity-first and perimeter-less security - they all need digital identities to establish digital trust. Join Sectigo's CSO and former Gartner analyst David Mahdi to learn about the importance of identity-first security and establishing digital trust for human and machine identities.
The accelerated consumption of digitized services has not only changed the banking landscape - it has affected anti-money laundering risks and defenses. David Stewart and Paul Franks of SAS weigh in on emerging risks, defenses and shifts in the AML compliance landscape.
Yelp gives its employees the flexibility to use the applications or tools required to be as productive as possible. With that flexibility, however, came the risks of Shadow IT, which is the use of software without explicit IT department approval. In order to allow their employees to maintain flexibility with...
Employees with too much access can pose an insider threat. When employees have access to more than they need to do their job, there are more opportunities for mistakes, whether accidental or not. Lack of accountability means you
don’t know who did what, when. If too many people have the same level of access and...
Over the years, this leading global hospitality company built a complex IT environment that included corporate machines, personal devices, kiosks, and home-grown and purchased applications—all housed in a large on-prem infrastructure. Heading into this decade, the company began adding cloud services, such as...
In this eBook, Okta defines and discuss four key phases on the path to customer identity and access management (CIAM) maturity and the pain points that companies encounter in each phase of the maturity curve. Okta proposes solutions for each of these problems, providing a roadmap for the tools and processes you should...
You've no doubt used customer identity and access management (CIAM) in your personal life as a customer of other businesses - whether you realized it or not. Perhaps you've logged into a website to purchase concert tickets. Or maybe you've used your social media account to log into a new e-commerce site. You may have...
As we put a tumultuous year in the rear-view mirror, many companies are looking for innovative ways to boost and redesign their businesses in order to jump-start growth. According to Gartner, the majority of CEOs say recovering revenue levels by accelerating digital initiatives will be a top priority in 2021 and 2022....
Facial recognition as a tool is not bad, but the manner in which it is used can make it look bad, says Brett Johnson, a consultant on cybersecurity, cybercrime and ID theft who was a central figure in the cybercrime world for over 20 years.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.