Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Private equity investment firm Thoma Bravo said it will acquire a majority interest in identity and access management (IAM) solutions firm Centrify. [Read More]
Hackers gained access to Timehop systems in December 2017, but the breach was only discovered on July 4. The incident affects 21 million users [Read More]
A recently detected Smoke Loader infection campaign is attempting to steal credentials from a broad range of applications, including web browsers, email clients, and more. [Read More]
Mozilla announces updated version of the Root Store Policy governing CAs trusted by its products [Read More]
Facebook notifies 800,000 users that people they had blocked were temporarily unblocked due to a bug. The company also detailed new API restrictions designed to protect user information [Read More]
Twitter has shared some details on new processes designed to prevent spam and malicious automation [Read More]
San Francisco, Calif (HQ) and Ramat Gan, Israel (R&D) threat prevention firm Preempt has raised $17.5 million in a Series B funding round. [Read More]
Identity management solutions provider Ping Identity acquires Elastic Beam and launches AI-based API security product [Read More]
DHS HART national biometric database will be useful to law enforcement, but experts are concerned about the civil liberties implications and securing access and use of the data [Read More]
Japanese electrical engineering company Yokogawa patches hardcoded credentials vulnerability affecting its STARDOM controllers [Read More]

FEATURES, INSIGHTS // Identity & Access

rss icon

Preston Hogue's picture
Even the most knowledgeable users — the very CISOs and security professionals who may be reading this article — can be duped into taking the bait.
Alastair Paterson's picture
By using best practices to protect credentials, while at the same time monitoring for leaked credentials and changes in the tools attackers use, you can mitigate the risk of account takeovers to your organization.
Travis Greene's picture
Having served aboard the USS Carl Vinson in the late 1990s, I can assure you that the World War II slogan, “loose lips sink ships” is still very much a part of Navy life.
Scott Simkin's picture
Training employees to be aware of credential-based attacks and how to avoid them, as well as adopting the right prevention-based measures, can have a material impact on stopping a common and effective attack techniques.
David Holmes's picture
What are the possible threat vectors if you were doing a threat model assessment for any of cloud passwords management models?
Rafal Los's picture
If you’re tired of changing your passwords using complex formulas you’ll never remember and have found yourself wondering just what your corporate security team is thinking, this post is for you.
David Holmes's picture
Password proliferation is bad, for many, many, many reasons. But the worst reason is that people tend to re-use passwords all over the place.
Travis Greene's picture
Two-factor authentication (2FA) is becoming more mainstream for businesses; however, businesses need to consider how 2FA should be implemented to maintain both external and internal control.
Travis Greene's picture
As the demand for identity governance in Asian companies grows, the key differentiator is that it’s going to come from a need to reduce risk.
Travis Greene's picture
While Identity and access management (IAM) is a mature discipline supporting internal employee access to applications, what is the future of IAM in support of end customer interactions?