Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The attack against the contractor, Fazio Mechanical Services, supports earlier claims that it was the vendor attackers stole credentials from in order to breach the retail giant.
The number sequence "123456" has overtaken "password" as the most common worst password among Internet users, an online security firm says.
Hackers broke into servers operated by The Washington Post and accessed employee user names and passwords, the publishing company reported.
The deal is slated to be closed by the end of the year.
SecureAuth, a provider of 2-Factor authentication solutions, launched SecureAuth 2-Factor as a Service (2FaaS), a cloud-hosted authentication solution.
A new survey found that many IT execs employees will sell corporate data if offered the right price - and they don't have the access management capabilities in place to easily stop them.
Venafi has launched a new product that the company describes as a mobile device "kill switch" which gives IT security teams the ability to instantly cut off mobile access to applications and networks when suspicious activity is detected.
Please join Trend Micro and SecurityWeek on Thursday, Dec. 5th at Ruth's Chris Steakhouse in Bellevue, WA for an interactive security event with great food and open bar!
Please join Trend Micro and SecurityWeek on Thursday, Dec. 5th at Ruth's Chris Steakhouse in Bellevue, WA for an interactive security event with great food and open bar!
CyberArk has launched a new Privileged Threat Analytics solution that provides targeted and actionable threat analytics on critical attack vectors by identifying malicious privileged user behavior.

FEATURES, INSIGHTS // Identity & Access

rss icon

Tom Grubb's picture
The day after Twin Towers fell, all kinds of security measures changed and new ones were implemented overnight. Is there a Web identity 911 equivalent wake-up call coming—a single event that will suddenly jolt us into enforced standards overnight?
Ram Mohan's picture
Are your passwords safe? Three simple ways to create memorable yet secure passwords
Jimmy Sorrells's picture
The WikiLeaks exposure highlights a clear need for a change in the way many classified networks are architected and managed, the way organizations manage their most sensitive information, and should also be looked at as a red flag by enterprises.
Markus Jakobsson's picture
In 1998, Intel announced the introduction of processor identities. Anti-fraud practitioners celebrated, security experts busied themselves thinking of the research implications, and privacy advocates were terrified...