Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Researcher finds ten vulnerabilities in Intel Security’s McAfee VirusScan Enterprise for Linux, including flaws that can be chained for remote code execution as root [Read More]
Identity management company Okta launches public bug bounty program with rewards of up to $15,000 per bug [Read More]
ImageWare has launched what it describes as the "first ever multimodal biometric authentication solution for the Microsoft ecosystem." [Read More]
A vulnerability in OAuth2.0 could result in an attacker being able to sign into a victim’s mobile app account and take control of it, security researchers have discovered. [Read More]
Amazon has prompted some of its customers to reset their passwords after learning that these might have been used to secure other online accounts as well. [Read More]
Users resetting their Yahoo! passwords might also want to check the list of authorized apps and devices, because iOS Mail will continue to have access to the account even after a password reset, researchers discovered. [Read More]
Please join Centrify and SecurityWeek for a live webinar where will discuss guidance from the National Institute of Standards and Technology (NIST) along with best practices and regulation mandates. [Read More]
Illusive Networks has announced SWIFT Guard, described by the company as cyber deception technology designed to protect SWIFT-connected banks from cyber criminals. [Read More]
Please join Centrify and SecurityWeek for a live webinar where will discuss guidance from the National Institute of Standards and Technology (NIST) along with best practices and regulation mandates. [Read More]
A new survey suggests that while security awareness is improving, security preparedness is not keeping pace. [Read More]

FEATURES, INSIGHTS // Identity & Access

rss icon

Travis Greene's picture
It’s been said that the military is always preparing to fight the last war. Are we doing the same in IT security? Are we doomed to always react to the threat?
Alastair Paterson's picture
While you may understand the risks that come from the use of social media, what options do you have to protect your organization against them?
Alan Cohen's picture
Micro-segmentation approaches play an important role in reducing the attack surface, the points of infiltration in the heart of the data center. By governing the traffic among servers, they reduce the risk of bad actors.
Travis Greene's picture
The investment in access certifications have reduced the workload on IT, but by treating all entitlements and users the same, we’ve put the burden on LOB managers to manage the risk of excessive access.
Travis Greene's picture
To understand why return on Access Governance is lower versus other security technologies, we first need to understand why Access Governance is implemented in the first place.
Travis Greene's picture
Yahoo's “Account Key” uses push notifications to their Yahoo Mail app on mobile devices. Will this securely replace passwords and two-factor authentication?
Travis Greene's picture
The true value of identity is not in creating more defense in depth, which means that identity is not the new perimeter.
Travis Greene's picture
As much fun as it is to wake up to patches waiting to be unwrapped, we don’t want the regret of “exploit Wednesday”, which is far more embarrassing than becoming a victim of a zero-day exploit.
Travis Greene's picture
Can IT security find a way to coexist with wearables faster than the first BYOD war and avoid a second war?
Travis Greene's picture
No IT organization has a seemingly unlimited budget the way that Team Oracle did in the 2013 America’s Cup race. But look closer at why spending on America’s Cup racing seems so out of control and it starts to look a bit more familiar.