Why identity is your #1 security problem
Watch the Computer Weekly interview
Bryan Glick, editor-in-chief at Computer Weekly, speaks to Okta's Max Faun about identity and security, covering:
Why 81% of cybersecurity breaches are password-related
How Customer Identity and Access Management (CIAM) can help you...
Successful customer identity management
Watch the Computer Weekly interview
Computer Weekly's Bryan Glick spoke to Max Faun from Okta to find out how you can deploy a successful identity management model.
How to make identity and access management work
Hear multiple real-world access management examples
The...
Critical authentication vulnerabilities contained in certain GE Healthcare medical imaging products could allow attackers to gain access to sensitive patient data, alter data and affect the availability of the equipment, according to new advisories from the vendor and the U.S. Department of Homeland Security.
Knowing your customer has become of more a challenge in a world where in-person interaction has become scarce. Andrew Bud of iProov discusses how identity proofing is evolving to meet the challenge.
This edition of the ISMG Security Report features an analysis of a serious Apple iOS "zero-click exploit" that could have allowed hackers to remotely gain complete control of a device. Also featured: a discussion of identity proofing challenges and a review of New Zealand's updated Privacy Act.
CIAM awareness has grown exponentially in 2020. Maturity? Not at quite the same pace. Keith Casey of Okta has authored a CIAM playbook, and in this interview offers potential benefits and challenges at each step of the journey.
Encryption keeps the internet secure, but it also gives bad actors the perfect hiding place. Join Gigamon and ISC2 for a deep dive into the latest encryption protocol, TLS 1.3, to learn what's different and what advantages it offers in the constant effort to stay one step ahead of threats.
Last week, fraudsters targeted two cryptocurrency platforms by accessing domains managed by GoDaddy, according to notices published by the victimized firms. The domain register company previously has had issues with unauthorized access.
"Has anyone witnessed any examples of criminals abusing artificial intelligence?" That's a question security firms have been raising. A new report has identified likely ways in which such attacks might occur and offers examples of threats already emerging
Blockchain technology has been floated as a solution to enable remote, electronic voting. But MIT researchers say today's paper-based systems, while imperfect, are still the most reliable way to prove to voters that their selections have been accurately cast and tallied.
As the use of telehealth continues to surge during the COVID-19 crisis, healthcare entities and their vendors must take critical steps to keep patient data private and secure, says attorney Janine Anthony Bowen.
A recent hacking incident had an unusual twist: The hacker who broke into the network of a Pennsylvania-based nonprofit entity apparently decided against injecting malware or proceeding with other malicious activities after discovering the organization serves individuals with intellectual disabilities.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.