Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

CloudFlare says it blocks Tor traffic because 94% of it is malicious, but Tor believes most of it comes from a tiny fraction of users [Read More]
Yahoo has expanded its password-free approach to user security to more applications for Android and iOS devices, namely Yahoo Finance, Fantasy, Messenger, and Sports. [Read More]
A survey conducted by SailPoint shows that 1 in 5 employees would sell their work passwords to an outsider, in many cases for less than $1,000 [Read More]
Instagram, Facebook’s mobile photo-sharing and video sharing service, is finally getting a long requested security feature; two-factor authentication. [Read More]
Tens of thousands of digital video recorders used to store footage from surveillance cameras can be easily hacked due to hardcoded passwords [Read More]
Using VoIP phones with default settings can allow hackers to hijack devices and eavesdrop on communications, experts warn [Read More]
Intel Authenticate is a hardware-enhanced, multifactor authentication solution that strengthens identity protection on the PC, making it less vulnerable to identity and security credential attacks, the company said. [Read More]
Dell ships PCs with pre-installed self-signed root certificate that poses serious security and privacy risks [Read More]
Most Windows-based network devices that hold sufficiently privileged credentials to enable attackers compromise other machines and accounts have been found to be susceptible to compromise. [Read More]
Hackers breached the systems of anti-adblocking service PageFair and used the access to deliver malware [Read More]

FEATURES, INSIGHTS // Identity & Access

rss icon

Travis Greene's picture
When big stories like the release of the Panama Papers breaks, it is an opportunity to self-evaluate what level of risk your organization could be exposed to.
Rafal Los's picture
Attackers are exploiting issues in corporate identity stores with greater frequency. If you doubt the danger that identities pose to your organization, you should conduct a simple test.
Travis Greene's picture
It’s been said that the military is always preparing to fight the last war. Are we doing the same in IT security? Are we doomed to always react to the threat?
Alastair Paterson's picture
While you may understand the risks that come from the use of social media, what options do you have to protect your organization against them?
Alan Cohen's picture
Micro-segmentation approaches play an important role in reducing the attack surface, the points of infiltration in the heart of the data center. By governing the traffic among servers, they reduce the risk of bad actors.
Travis Greene's picture
The investment in access certifications have reduced the workload on IT, but by treating all entitlements and users the same, we’ve put the burden on LOB managers to manage the risk of excessive access.
Travis Greene's picture
To understand why return on Access Governance is lower versus other security technologies, we first need to understand why Access Governance is implemented in the first place.
Travis Greene's picture
Yahoo's “Account Key” uses push notifications to their Yahoo Mail app on mobile devices. Will this securely replace passwords and two-factor authentication?
Travis Greene's picture
The true value of identity is not in creating more defense in depth, which means that identity is not the new perimeter.
Travis Greene's picture
As much fun as it is to wake up to patches waiting to be unwrapped, we don’t want the regret of “exploit Wednesday”, which is far more embarrassing than becoming a victim of a zero-day exploit.