This edition of the ISMG Security Report features an analysis of a serious Apple iOS "zero-click exploit" that could have allowed hackers to remotely gain complete control of a device. Also featured: a discussion of identity proofing challenges and a review of New Zealand's updated Privacy Act.
CIAM awareness has grown exponentially in 2020. Maturity? Not at quite the same pace. Keith Casey of Okta has authored a CIAM playbook, and in this interview offers potential benefits and challenges at each step of the journey.
Spin up a conversation about someone’s security operations and chances are the conversation will quickly move to their security information and event management (SIEM) tool.
A SIEM can play an important role in your security strategy - But figuring out where it belongs (and what type of SIEM is best for you)...
New Zealand's refreshed Privacy Act, which came into effect Tuesday, introduces breach notification requirements and civil penalties. It also holds data handlers to higher responsibilities to counter new threats to personal data. But the law doesn't impose financial penalties as severe as the EU's GDPR.
Canon USA has finally acknowledged that a ransomware attack earlier this year involved the theft of corporate data, including such employee information as Social Security numbers and financial account numbers.
CISA is warning about a possible password leak that could affect vulnerable Fortinet VPNs and lead to further exploitation. The latest agency notice comes just days after hackers began publishing what they claim are leaked passwords on underground forums, according to researchers.
Sophos is warning that some of its customers may have had their data exposed to a misconfigured internal system, according to a published report. The security firm confirmed that a "small set" of customers was affected.
Glen Hymers, CISO and head of data protection at the U.K.-based charity Save the Children International, says adapting to a cloud-first environment requires extensive security measures, including automated monitoring.
Encryption keeps the internet secure, but it also gives bad actors the perfect hiding place. Join Gigamon and ISC2 for a deep dive into the latest encryption protocol, TLS 1.3, to learn what's different and what advantages it offers in the constant effort to stay one step ahead of threats.
Every business and industry are unique. Take finance, for example, who are in the business of managing money. How do the finance industry’s IAM priorities differ from an IT organization, who is in the business of selling technology?
Download the eBook to learn:
The main IAM challenges and priorities for...