Security Experts:

long dotted


Trustwave discloses the details of several vulnerabilities affecting Netgear routers, including devices that are top-selling products on Amazon and Best Buy [Read More]
The personal details of 800,000 customers of Swiss telecoms giant Swisscom were compromised in a data breach [Read More]
Gas stations exposed to remote hacker attacks due to several vulnerabilities found in a widely used automation system [Read More]
The massive 2016 breach that Uber covered up for more than a year was the work of a couple of individuals from Canada and Florida [Read More]
Malware and phishing attacks growingly abuse SSL to increase their chances of success, Zscaler said in its latest report [Read More]
Google Cloud Identity & Access Management (IAM) users can now assign custom roles for fine-grained security [Read More]
Several security researchers and firms have disclosed potentially serious vulnerabilities they found in Asus routers [Read More]
Facebook acquires Confirm, a Boston-based startup that specializes in identity verification solutions for applications that require proof of identity [Read More]
Seagate patches arbitrary file deletion and command injection vulnerabilities in Personal Cloud, and an XSS flaw in GoFlex [Read More]
Authentication is a risk valuation - What might be the right solution for one organization or environment might be the wrong solution for another. [Read More]

FEATURES, INSIGHTS // Identity & Access

rss icon

Travis Greene's picture
Two-factor authentication (2FA) is becoming more mainstream for businesses; however, businesses need to consider how 2FA should be implemented to maintain both external and internal control.
Travis Greene's picture
As the demand for identity governance in Asian companies grows, the key differentiator is that it’s going to come from a need to reduce risk.
Travis Greene's picture
While Identity and access management (IAM) is a mature discipline supporting internal employee access to applications, what is the future of IAM in support of end customer interactions?
Travis Greene's picture
Like all security measures, MFA is not an instant fix to safeguard credentials. But, understanding the risks of MFA limitations is the first step towards mitigation.
Travis Greene's picture
Passwords really are that bad, and we now have another mandate to address this ongoing issue, or, the so-called elephant in the room: The growing push for multi-factor authentication.
Travis Greene's picture
When big stories like the release of the Panama Papers breaks, it is an opportunity to self-evaluate what level of risk your organization could be exposed to.
Rafal Los's picture
Attackers are exploiting issues in corporate identity stores with greater frequency. If you doubt the danger that identities pose to your organization, you should conduct a simple test.
Travis Greene's picture
It’s been said that the military is always preparing to fight the last war. Are we doing the same in IT security? Are we doomed to always react to the threat?
Alastair Paterson's picture
While you may understand the risks that come from the use of social media, what options do you have to protect your organization against them?
Alan Cohen's picture
Micro-segmentation approaches play an important role in reducing the attack surface, the points of infiltration in the heart of the data center. By governing the traffic among servers, they reduce the risk of bad actors.