As vice president of Red Team Services at CyberArk, Shay Nahari has an up-close view of an enterprise's soft defenses. He sees adversaries attack workforce users and compromise credentials. The lines between identity and privilege are colliding. More than ever, Nahari says, context matters.
As organizations look to streamline the way they work, they can introduce unknown cybersecurity gaps that make them vulnerable to a ransomware attack. CyberArk's Bryan Murphy shares insight on how CISOs and CIOs can implement a strong identity security program and prevent breaches.
The number of breach reports filed by U.S. organizations looks set to break records, as breaches tied to phishing, ransomware and supply chain attacks keep surging, the Identity Theft Resource Center warns. It says that there's also been a rise in tardy breach notifications containing little detail.
The acquisition of the SAFE Identity consortium and its trust framework by DirectTrust, best known for creating and maintaining trust frameworks for secure email messaging in healthcare, will help facilitate new secure health information exchange use cases, says DirectTrust CEO Scott Stuewe.
The White House is preparing executive branch agencies to adopt "zero trust" network architectures by 2024, with CISA and the OMB overseeing the creation of technology road maps that departments must follow. This is a major component of President Biden's cybersecurity executive order.
Implementing a comprehensive identity security program might be described as a Holy Grail. But what does it mean to reduce the complexity for organizations and their employees? CyberArk's David Higgins outlines how to modernize an organization’s identity and access management, or IAM.
As organizations find themselves amid cloud migration, what should they be discussing in regard to what they want to move to the cloud and how to protect identities? CyberArk's Khizar Sultan offers his vision of a migration road map and milestones.
As the lines blur between identity and privilege, there is a growing set of solutions to secure the anytime, anywhere workforce. Archit Lohokare, CyberArk’s vice president of product management, discusses passwordless authentication, zero trust and other ways enterprises are modernizing identity and access.
The network has become hybrid and multi-cloud, and security now needs to be harmonized across network, workload and application domains. The complexity of your disparate and dynamic environments is an enemy and you need to defend against it, as you would against any sophiscated adversary.
With more than 61% of breaches attributed to stolen passwords, a password manager can go a long way in helping enterprises enhance security, say Chandan Pani, CISO at Mindtree, and Lloyd Evans, identity lead, JAPAC, at LogMeIn.
Customer identity and access management - CIAM - has taken off over the past year. But too many of the initiatives are limited in scale, says Dennis McDermott of OpenText. He shares key CIAM components and milestones.
The Identity Theft Resource Center, a nationally recognized nonprofit organization established to support victims of identity crime, has published new research that shows nearly 30% of people who contact the ITRC are victims of more than one identity crime.