Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Duo Security, a cloud-based provider of identity and access management solutions, has raised an additional $70 million in funding, bringing the total amount raised by the company to $119 million, with a post-money valuation pegged at $1.17 billion. [Read More]
Many victims of the Equifax hack had their personal information stolen by cybercriminals prior to the breach, IRS says [Read More]
IT security professionals, particularly executives, admit snooping on the corporate network, One Identity study shows [Read More]
Google said it would offer stronger online security for "high risk" users who may be frequent targets of online attacks. [Read More]
DHS issues binding operational directive requiring all federal agencies to use HTTPS, DMARC and STARTTLS [Read More]
Sample data provided by scammers claiming to have hacked Equifax may have come from another company’s unprotected QA servers [Read More]
Please join RSA and SecurityWeek for this webinar to learn how you can smooth your journey to the cloud by providing convenient and secure access to cloud applications all while giving users the freedom to be more productive. [Read More]
Accenture leaks over 100GB of data, including private keys and credentials, via four unprotected cloud storage containers [Read More]
Hackers breached Disqus in 2012 and stole information belonging to 17.5 million users, including some passwords [Read More]
Hackers gained access to website of market research company Forrester and stole research reports [Read More]

FEATURES, INSIGHTS // Identity & Access

rss icon

Marc Solomon's picture
How do you determine the amount and mix of data that’s “just right” for your organization? To answer this question it helps to understand what’s driving the need for data in the first place.
Markus Jakobsson's picture
While 2FA is a big step above and beyond the use of traditional passwords, it is not infallible, and thinking so makes the risk of failure even greater.
Preston Hogue's picture
Even the most knowledgeable users — the very CISOs and security professionals who may be reading this article — can be duped into taking the bait.
Alastair Paterson's picture
By using best practices to protect credentials, while at the same time monitoring for leaked credentials and changes in the tools attackers use, you can mitigate the risk of account takeovers to your organization.
Travis Greene's picture
Having served aboard the USS Carl Vinson in the late 1990s, I can assure you that the World War II slogan, “loose lips sink ships” is still very much a part of Navy life.
Scott Simkin's picture
Training employees to be aware of credential-based attacks and how to avoid them, as well as adopting the right prevention-based measures, can have a material impact on stopping a common and effective attack techniques.
David Holmes's picture
What are the possible threat vectors if you were doing a threat model assessment for any of cloud passwords management models?
Rafal Los's picture
If you’re tired of changing your passwords using complex formulas you’ll never remember and have found yourself wondering just what your corporate security team is thinking, this post is for you.
David Holmes's picture
Password proliferation is bad, for many, many, many reasons. But the worst reason is that people tend to re-use passwords all over the place.
Travis Greene's picture
Two-factor authentication (2FA) is becoming more mainstream for businesses; however, businesses need to consider how 2FA should be implemented to maintain both external and internal control.