Many IT users lack a full understanding of how privileged accounts function, and how they fit as a key component into the anatomy of a typical breach. That makes IT teams and their organizations much more vulnerable to potential monetary and reputational damage from increasing cyber threats.
Download this...
By applying a risk-based approach to identity assurance, organizations can go beyond a simple yes/no decision or step-up authentication process and add intelligence that provides broader context about the user and the situation in which they are requesting access.
Download this whitepaper and learn:
Why...
Even though most organizations do not have a "blank slate," it doesn't mean they can't rethink their IAM strategy. Acknowledging identity as the new perimeter, enterprises can reimagine how they utilize IAM to reduce unnecessary risk and cost and better enable the business.
Download this whitepaper to learn how...
You can't stop the IT cloud revolution. Not that you'd want to: Cloud deployment offers much needed scalable capacity, business agility and, in many cases, dramatically lower operating costs. But you are on the hook to secure your organization's access. You need a new approach that that works with today's modern...
In the Face of Advanced Threats, is Your Organization's Security Posture Reactive or Proactive?
Today's most advanced threat actors - whether external or internal - are stealthier than ever and able to hide within one's systems for days, weeks or even months as they gather intel and prepare to strike. Sixty-one...
A recently published 2017 survey of over 400 security professionals in the U.S., U.K. and Germany measured how well their organizations implemented security controls for SSH keys. The results show that most organizations are underprepared to protect against SSH-based attacks, with fewer than half following industry...
SSH keys provide the highest level of access rights and privileges for servers, applications and virtual instances. Cyber criminals want this trusted status and invest considerable resources into acquiring and using SSH keys in their attacks.
Even though SSH keys are the credentials that provide the most privileged...
It's frightening what criminals can buy on the dark web, but it's even scarier that they may be buying your own security certificates to use against you. Venafi recently sponsored a six-month investigation into the sale of digital code signing certificates on the dark web. Conducted with the Cyber Security Research...
Despite all the talk of the "death of the password," we don't yet live in a post-password world. With dozens of different accounts, emails, and databases that we have to access, there are a myriad of passwords to remember. As a result, the security of businesses suffers from inaccurate password tracking, lack of...
Healthcare technology has made leaps and bounds in terms of its ability to improve patient outcomes, and yet many technologies are being deployed before security concerns can catch up.
Yes, malware commonly targets the Windows operating system. But if you limit malware analysis to Windows OS, you're leaving gaping vulnerabilities, says Christopher Kruegel of Lastline Inc. Here's how to maximize your analysis.
One common limitation of malware analysis is that organizations focus too much of their...
Spear phishing is the common trigger to many of the most popular - and successful - targeted attacks. How can organizations improve their defenses? Jon Clay of Trend Micro tells how to better spot and stop spear phishing.
According to Verizon, 81% of hacking-related breaches involve either stolen and/or weak passwords. By eliminating multiple passwords and individual application log-ins, Single Sign-On (SSO) not only improves security posture, but significantly increases IT efficiency and user productivity.
While Single Sign-On...
It's frightening what criminals can buy on the dark web. But it's even scarier that they may be buying your own security certificates to use against you. Venafi recently sponsored a six-month investigation into the sale of digital code signing certificates on the dark web. Conducted with the Cyber Security Research...
Our increased dependence on machines is so profound that even the definition of machine is undergoing radical change. The number and type of physical devices on enterprise networks has been rising rapidly, but this is outstripped by the number of applications and services they host.
At the same time, cloud adoption...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing gdpr.inforisktoday.com, you agree to our use of cookies.