Mickey Bresman, co-founder and CEO of Semperis, discusses why ransomware actors increasingly target identity systems and backup files. He explains the importance of securing these systems to prevent attackers from crippling organizations and extorting ransom payments.
David Bradbury, chief security officer at Okta, discusses the shift in the cyberthreat battleground, the effect of artificial intelligence technology on identity protection, Okta's investments into its own security and lessons learned along the way.
SailPoint's CEO Mark McClain discusses the complexities of identity security and the emerging threats and solutions in the changing landscape of cybersecurity. Perimeter-based security has expanded, so security teams need to understand access in a world of mobile and cloud computing.
The proliferation of identities, combined with cloud migration and the growing sophistication of attacks, has created the perfect storm for security teams who are facing a surge in identity-based cyberattacks. But as the number of identities grows, "you can do more with less," experts advise.
Threats to nonhuman identities encompass a broad spectrum of entities, including automation tools, AI agents and cloud applications that authenticate differently from traditional human identities, such as usernames and passwords, said Danny Brickman, co-founder and CEO, Oasis Security.
Organizations recognize the need for robust identity platforms to protect data and apply controls. With so much data being generated and processed, the market is going to experience a proliferation of next-generation identity platforms, said Alberto Yépez, co-founder and managing director, ForgePoint Capital.
With the ever-evolving threat landscape overlaid onto the continuous digital transformation underway at so many organizations across all sectors, a unified identity-centered zero trust security approach has never been more important, said Clay Rogers of CyberArk and Amit Chhikara of Deloitte.
The feds have expanded regulations for cybersecurity with the long-awaited NIST CSF 2.0 standards, and the new guidelines place more emphasis on overall risk management, as well as the "outsized role of identity in the context of a zero trust security posture," said Rohit Ghai, CEO, RSA.
Organizations are facing a critical imperative: strengthening their cyber resilience. Brian Spanswick of Cohesity and Tom Gillis of Cisco share insights into the evolving landscape of cyberattacks and the proactive measures being taken to combat them.
IAM, whether done poorly, or well, can be a key differentiator in providing a good user experience and key tool in the information security toolchest. But, moving from distributed and local authentication to a central platform can also introduce risk if not done properly. We’ll talk about modern challenges with...
The U.S. federal government's cybersecurity agency warned that hackers are exploiting a vulnerability in DevOps platform GitLab that was patched in January. The vulnerability allows hackers to use the "forgot your password" function to send a reset link to an attacker-controlled inbox.
Business leaders across industries are recognize that managing digital identities and their access across the organization today is essential to securing the business and providing the agility the business needs to unlock its full potential.
Download this whitepaper guide to learn more on:
The steps to developing...
Big Blue took a big bite out of the secrets management space with its proposed buy of San Francisco-based HashiCorp, which rivals CyberArk in its ability to authenticate and authorize access to sensitive data. Will IBM double down on the privileged access market, or let the technology languish?
Login.gov, the federal government's single sign-on service, told staffers Wednesday that there would be a change in its top leadership starting next month as the organization ramps up plans to begin testing facial recognition technologies and new pricing models.
Banks are concerned about advancements in voice-cloning technology and the threat it poses to authentication. The failure of identity-centric solutions to combat synthetic identity fraud has convinced 91% of U.S. banks to reconsider their use of voice verification for major customers.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.