Britain's privacy watchdog ordered Serco Leisure, which operates nearly 40 leisure facilities, to cease using facial recognition and fingerprint scanning for clocking employees in and out, saying the company failed to demonstrate such technology was "necessary or proportionate."
Welcome to the report summarizing the survey conducted in spring/summer 2023. It attracted 214
responses from senior cybersecurity professionals in the NA,
APAC, UKI and EU regions.
The goals for this study were to identify:
The top organizational challenges in securing non-SSO
integrated apps;
How...
Welcome to the webinar summarizing the survey: Critical Gaps in
Securing Identities. This survey was conducted in Q1 and 2 of 2023, and attracted more than 200
responses from senior cybersecurity professionals.
More than just survey results, this OnDemand webinar offers:
The top organizational challenges in...
Days after attributing the recent breach in its customer environment, enterprise software company JumpCloud on Thursday confirmed the involvement of a North Korean nation-state actor who appears to be financially motivated to steal cryptocurrency.
To outsource a non-core competence...or to risk control, understanding cost implications, and/or ability to evaluate functionality in competing offerings? That's the question...right?
This report has been a collaboration between ISMG and Optiv since the beginning of 2023 when ISMG surveyed 426 senior cybersecurity...
Zero trust principles and architectures are being widely embraced and adopted by the public and private sectors. Legacy security architectures and network defenses are simply ineffective at managing a world more reliant on the cloud and remote workers. Almost every attack today requires privilege for the initial...
Identity Security is more critical than ever before in today’s modern business. But finding the right solution can be a monumental task. Cybersecurity decision makers must consider several key requirements to ensure they choose the right solution.
In this buyer’s guide to privileged access management, learn...
Cybersecurity leaders must address high levels of complexity regarding authentication and identity security – in fact, 70% say they are overwhelmed by their authentication practices. A survey conducted by Censuswide explore why, as how to get ahead of the challenge.
Download the latest consensus from...
Authentication, that foundational control upon which virtually all other cybersecurity measures rely, tends to be a complex, cumbersome workload in the enterprise. Using multiple solutions creates silos – and ultimately inefficient administration, end-user frustration, and risk.
Contemporary enterprises are...
As the threat landscape changes, the need for tighter security is ever-increasing: cyberattacks and data breaches are on
the rise and these events can do significant damage to your organization. This is where governance best practices and application risk management come in.
Download this eBook to gain more...
Synthetic identity fraud is the fastest-growing financial crime in the country. By combining real and fabricated personal information, a synthetic identity is specifically designed to look and act like a valid identity - until it doesn’t, leaving financial losses and criminal activity in its wake.
It’s no secret—hackers are after your passwords. Year after year, credential theft continues to be a top attack vector, yet organizations struggle to secure their credentials. Internal and external users risk being compromised when their passwords are shared, improperly stored, or used across multiple accounts and...
Over half of organizations have made changes to their cybersecurity structure over the last two years in response to this shift in business environments, but it’s barely moved the needle. The number of cyberattacks has increased, specifically through third-party vendor access, and businesses are failing to take...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing gdpr.inforisktoday.com, you agree to our use of cookies.