No script, no filter: Just Microsoft’s Edna Conway and Cisco’s Wendy Nather gathering with privacy leader Michelle Dennedy to discuss the impact of the SolarWinds supply chain attack and to play Buzzword Mystery Date with SASE, CIAM and "passwordless" authentication - are these trends dreamboats or duds?
Four editors at Information Security Media Group discuss important cybersecurity issues, including dealing with attacks targeting the aging Accellion File Transfer appliance and taking steps to enhance employee authentication.
An attacker added a backdoor to the source code for PHP, an open-source, server-side scripting language used by more than 75% of the world's websites. Core PHP project members say the backdoor was quickly removed.
Many organizations have updated the authentication process for customers to help ensure frictionless transactions. Now, some are starting to take similar steps to streamline and enhance authentication of their employees - especially those working remotely.
Passwords are a problem. 95% of IT professionals agree there are risks to using passwords, and 92% see passwordless authentication in their organization’s future. Is going passwordless the right solution for businesses tackling the password problem?
Download the report to:
Dive into where the largest password...
Organizations have rapidly shifted their businesses to operate remotely, and the benefits of doing so are significant. However, with remote work also comes new risks, and businesses are faced with the challenge of ensuring every login is secure, no matter where employees are working.
Download the eBook...
Years ago, when he was working in systems integration, Mirza Asrar Baig envisioned the concept of digital risk protection technology. Today, as CEO of CTM360, he is promoting it as a way to provide “offensive defense.”
Jeremy Grant, coordinator of the Better Identity Coalition, offers a progress report on the 3-year-old organization's efforts to help prevent breaches with better identity management.
The onslaught of account takeover attacks from insecure passwords is driving the rapid adoption of passwordless solutions. While the risk reduction benefits are substantial, eliminating passwords is just the first step on the path to fundamentally strong authentication. In the “new normal” era of work from...
The Zero Trust Security approach ensures the right people have the right level of access, to the right resources, in the right context, and that access is assessed continuously - all without adding friction for the user. The adoption of mobile and cloud means that we can no longer have a network perimeter-centric view...
As organizations adopt more cloud infrastructure across AWS, GCP and Microsoft Azure to keep up with the rapid pace of innovation, there is a harsh realization that traditional approaches to security and operations simply can’t keep up. In a world where dynamic resources continuously spin up and down, and may only...
In today's ever-evolving business environment, strategic IT initiatives like migration to the cloud are accelerating, as companies seek the flexibility and lower cost of moving to the cloud. While increasing a company’s velocity, this initiative has a barrier to faster implementation: security
Download this white...
More organizations are adopting cloud infrastructure across AWS, GCP, and Azure to deliver continuous innovation and new digital experiences. With new levels of scale, traditional approaches to access management can slow down adoption, which is bad for the business.
The cloud operating model offers a fresh approach...
Identity and access management strategies are a staple of any institution’s security approach. IAM allows campuses to know who its community members are, and they allow students, faculty, and staff to have appropriate access to resources and data. Without effective identity and access management practices, many of...
There are hundreds of billions of passwords in the world
today, with more being created every day. In fact, the
average business user maintains an astounding average
of 191 passwords.1 Unfortunately, these passwords represent
a fundamentally weak link in most organizations because
they will always be...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.