Multi-factor authentication is defined as two out of the three categories of knowledge, possession, and inherence
factors. For example, a password plus SMS OTP would be a combination of knowledge and possession; a
password with biometric would be a combination of knowledge and inherence.
However, there’s also a...
Risk can be a confusing topic, summarized in heatmaps with low, medium, and high as the most accurate indicators.
While valuable to GRC pros, it’s only a small piece of the puzzle. And, more importantly, it’s decidedly not speaking the same language as the rest of the organization.
Risk professionals can now...
The latest edition of the ISMG Security Report features insight from U.S. Sen. Angus King on why the federal government needs to declare a clear response to cybercriminals in order to deter them. Also featured: Ransomware affiliates gain power and promoting diversity of thought in cybersecurity.
With personal and professional lives merging at unprecedented
rates, strong password hygiene is critical to your business’s success
and security. IT teams must adapt to ensure employees’ credentials
remain secure in a work-from-anywhere world.
Download this report that explores the
password behavior of...
Customer authentication is a critical component of almost every application that exists because it serves as a product gateway impacting 100% of customers. While it is a standard feature, it is not easy to get right and the stakes for getting it right are higher than ever: 46% of customers abandon a transaction...
Explore the shifts in the security landscape that led to the creation of ZeroTrust, what the Zero Trust Extended Ecosystem (ZTX) framework looks like today,
and how organizations can utilize Okta as the foundation for a successful Zero Trust program now, and in the future.
And learn more about:
"There are so many basics we need to get right," says Daniel Dresner, professor of cyber security at Manchester University. In this interview, he discusses the cybersecurity practices that he recommends to make the task of securing small- to medium-sized enterprises less overwhelming.
Financial institutions across the country executed quick pivots to allow operations to continue during this unprecedented time. This abrupt shift to remote work and virtual processes served to accelerate technology adoption among employees and customers, from digital banking solutions to collaborative communication...
The White House is preparing executive branch agencies to adopt "zero trust" network architectures by 2024, with CISA and the OMB overseeing the creation of technology road maps that departments must follow. This is a major component of President Biden's cybersecurity executive order.
The most sought-after type of victim for ransomware-wielding attackers is a large, U.S.-based business with at least $100 million in revenue, not operating in the healthcare or education sector, with remote access available via remote desktop protocol or VPN credentials, threat intelligence firm Kela reports.
Cryptocurrency exchange Coinbase faces potential user trust challenges after a system error led it to send out false automated security alerts to about 125,000 customers indicating their two-factor authentication settings had been changed.
Google has removed eight fake crypto-mining apps from its Play Store, but researchers at security firm Trend Micro have flagged 120 other apps on users' phones purporting to also be crypto-mining. Users paid for services the eight apps never delivered.
Healthcare organizations are an ongoing criminal
target due to the rich data they keep.
With the extensive, rapid shift of medical services to
the digital world and vast sets of health data gathered
amid the pandemic, criminals will likely seize this
opportunity to infiltrate networks and hack...
The United States federal government relies heavily on information technology (IT) to drive efficiencies and increase
public engagement. However, an increase in cyberattacks and data breaches impacting government operations creates a
storm of risks and challenges.
Download this whitepaper for more information...