The modern threat environment continues to evolve, with automation,
the move to the cloud, software as a service, AI, new user expectations
and increasingly sophisticated attacks from threat actors. How do we
cope with those changes today - and the certainty that there will be
new challenges tomorrow?
We do so by...
Learn about best practices for privileged access management (PAM) in the context of how you’d secure valuables in your own home. In this episode of The Drawing Board, our experts discuss three PAM controls for guarding the pathways leading to the most sensitive resources in your house:
Identity and access management technology has been around for decades, but identity-related breaches happen every day. The problem is not the underlying system. It’s whether organizations can take advantage of the wealth of data within their systems, said Radiant Logic's Wade Ellery, Field Chief Technical Officer...
Hardware-based authentication vendor Yubico plans to go public at an $800 million valuation by merging with a special purpose acquisition company. The Swedish firm said becoming publicly traded will accelerate Yubico's push to enter adjacent authentication markets and land clients in new verticals.
In the latest weekly update, Venable's Jeremy Grant joins ISMG editors to discuss how to defend against the increasing use of MFA fatigue attacks, takeaways from a recent U.S. probe into compliance issues related to Login.gov services and the latest updates on the Improving Digital Identity Act.
IAM has always been a manual process. While many organizations try to automate IAM, it is not easy. Pooja Agrawalla, head of IAM at NXP Semiconductors and winner of ISMG's Dynamic CISO Excellence Award for Women Leaders in Cybersecurity, discusses best practices for IAM deployment and automation.
We now exist in a world of ignored credential proliferation, and we’re paying the price. The 2020 Verizon Data Breach Investigation Report claims over 80% of hacking-related data breaches involve brute force or the use of lost, stolen, or compromised passwords.
Gartner estimates that through 2025, 99 percent of...
Zero trust principles and architectures are being widely embraced and adopted by the public and private sectors. Legacy security architectures and network defenses are simply ineffective at managing a world more reliant on the cloud and remote workers. Almost every attack today requires privilege for the initial...
As technology progresses, breaches progress and with hybrid work environments as the new norm, this means more devices are outside of the corporate network.
The question organizations must ask is how can users securely perform their work with a set of least privileges while preventing business disruption?
The...
From spam and bogus product reviews to sophisticated, costly financial fraud, fake users can create havoc in your ecosystem.
Stop them before they start.
Download our free eBook to learn how to...
Use data you may already have to discover the person behind the number;
Build a detailed image of new customers...
A large healthcare organization manages over 31,000 identities across different units including clinics, home health services, and healthcare providers. When they decided to upgrade their Enterprise Resource Planning (ERP) system to a cloud-based approach, they knew the initiative would be a challenge. The company was...
The average business is not protecting or handling secrets like the major vulnerability they are, putting sensitive company and customer data at serious risk.
Our survey reveals the scope and complexity of the secrets management problem. Findings include:
52% of workers say that digital transformation has made...
60% of IT/Devops organizations have experienced secrets leakage. For today’s business, security is a teamwide effort. Read why a culture of security is crucial, and how to build it the right way.
Mindful habits across your company will protect your business and its customers. Download and read how:
Enterprise...
Learn how integrating 1Password with your existing IAM infrastructure strengthens your security posture and unifies auditing, compliance, and reporting workflows.
Single sign-on protects logins for approved apps covered by your SSO provider. 1Password protects virtually everything else – so no logins get left...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.