The Good Health Pass Collaborative is developing a road map for digital health passes that international travelers could use to prove they have been tested for COVID-19. Dakota Gruener, executive director of ID2020, which launched the project, describes the effort, including privacy-protection measures.
Security firms Crowdstrike, Palo Alto Networks and Sailpoint are making acquisitions to bolster their product portfolios. Here's a rundown of the deals.
This edition of the ISMG Security Report features an analysis of the impact of a hacking campaign linked to Russia’s Sandworm that targeted companies using Centreon IT monitoring software. Also featured: a discussion of CIAM trends; a critique of Bloomberg's update on alleged Supermicro supply chain hack.
AML fines are rising each year as financial institutions continue to make the same compliance mistakes. Often, organizations must cobble together multiple point solutions, leaving unseen gaps in their compliance process.
In this e-book, you'll learn how end-to-end AML compliance solutions are changing this reality...
In today’s digital-first world, businesses subject to KYC requirements must find a way to create onboarding and authentication processes that achieve compliance and inhibit fraud, without alienating good customers. Time and again, research shows that overly cumbersome and time consuming processes turn good customers...
LastPass has analyzed over 47,000 businesses to bring you insights into security behavior worldwide.
The takeaway is clear: Many businesses are making significant strides in some areas of password and access security – but there is still a lot of work to be done. Use of important security measures like...
Today’s business environment is anything but simple – and increased cyber threats just complicate things more. For employees to work efficiently and securely, you need to know who they are and what they need to access, so employees can connect seamlessly to the tools they need while you maintain oversight and...
A hacker breached a Florida city's water treatment network, increasing the amount of lye that would be added to the water to a dangerous level. Officials say they caught the change immediately and reversed it. Reuters reports that the system was accessed via the city's TeamViewer remote access software.
As organizations move along the path of digital transformation, enterprise cloud usage continues to evolve as well. While cloud-born applications still need the same data protection workflows as when they were on-premises, the native protection services offered by public
cloud providers often can’t deliver...
80% of organizations are resorting to deploying data protection solutions from multiple vendors.
Compared to those working with a single data protection
vendor, on average, organizations using multiple data
protection vendors are likely to experience higher downtime
related costs, higher data
loss costs and are...
The cloud-native containerized applications that have emerged over the last decade
were originally used for stateless web services. But today, cloud native applications
have matured, and along with advanced container orchestrator capabilities, we are
seeing customers deploy both stateless and stateful workloads in...
Cloud Disaster Recovery (Cloud DR) allows customers to efficiently extend Dell EMC data protection for VMware environments to the public cloud, including AWS, Azure and VMware Cloud on AWS.
Using Cloud DR, Dell EMC Data Protection tools can store virtual machines copies over cheap object storage (AWS S3, or Azure...
Organizations continue to embrace digital transformation for both their business and IT groups. The use of public cloud infrastructure has become a key driver for that transformation as organizations are using cloud infrastructure services to mitigate the capital and operational expenses associated with traditional IT...
Welcome to The Periodic Table of Enterprise Data Protection. It maps the data protection modernization journey of enterprises and serves to explain the complexities of the subject matter in an organized and structural format. It also provides a stark comparison between traditional data protection and the various use...
It's one thing to plan for a remote workforce. Quite another when you suddenly have to deploy and support it - at 100%. Martin Mazor of Entertainment Partners discusses the vital role of identity in his enterprise's unique business.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.eu, you agree to our use of cookies.