In the latest weekly update, Jeremy Grant of Venable joins three ISMG editors to discuss why the U.S. government is taking a back seat on digital identity issues, the risks of artificial intelligence, and takeaways from the U.S. Cyber Safety Review Board's recent report on cybercrime group Lapsus$.
Endpoint Privilege Security controls are foundational but are often missing from the endpoint security consideration and strategy. The continued onslaught of attack of any complexity and an unsatisfactory record of a universally adopted endpoint security stack (including an antivirus, EDR, personal firewall, etc.)...
The crazy fluctuations in the stock market over the past 14 months can drive short-term thinking for publicly traded firms, said CEO Fran Rosch. A proposed $2.3 billion buy by Thoma Bravo would allow ForgeRock to think about the best long-term investments and opportunities in the identity market.
Securing these identities – both human and machine - requires greater collaboration and cooperation between IT & Security teams. In this webinar with industry experts, we will discuss various Identity Security strategies to navigate challenges and potential gaps to align to business goals.
The modern threat environment continues to evolve, with automation,
the move to the cloud, software as a service, AI, new user expectations
and increasingly sophisticated attacks from threat actors. How do we
cope with those changes today - and the certainty that there will be
new challenges tomorrow?
We do so by...
In the digital world, trust acts as the conduit to a productive business-to-consumer relationship. A lack of brand trust may stifle new customer acquisition and average-customer-value (ACV). You can avoid these pitfalls and reap the benefits by adopting a business strategy which incorporates continuous trust to reduce...
Active Directory is involved in 9 out of 10 cyberattacks. How can organizations best protect their enterprise identity infrastructures? We surveyed IT and security leaders at more than 50 enterprise organizations to determine the most valuable capabilities of today’s identity threat detection and response (ITDR)...
Today’s global fraud outlook sits at the intersection of market volatility, accelerated digital transformation and consumer vulnerability. Cybercrime-as-a-service plug and
play technology tools are making it easier than ever for even unsophisticated fraud rings to launch and scale costly attacks.
The...
OneSpan plans to purchase an Australian startup founded by a longtime Quest Software executive to securely store and vault documents based on blockchain technology. Melbourne, Victoria-based ProvenDB uses blockchain to deliver security that prevents data tampering and document alteration.
In the latest update, four ISMG editors discuss important issues of 2022, including: CISO Marene Allison's unique career path; Ukrainian government cybersecurity official Victor Zhora on lessons learned from countering cyberattacks; and insights from CEO Nikesh Arora of Palo Alto Networks.
Multifactor authentication needs to move away from one-time passwords sent via text message and embrace modern standards that prevent man-in-the-middle attacks. Plus, excessive identity challenges online lead to 20% of e-commerce transactions being abandoned, say experts at Authenticate 2022.
Japanese conglomerate Hitachi has sold its small identity-as-a-service practice to Canadian software specialist Volaris Group to drive better execution around core products. The firm found it was easy to get lost within Hitachi given the conglomerate's size and focus on electronics and engineering.
There’s been an unintended effect from Okta’s acquisition of customer identity giant Auth0. It confused its own sales force with similar CIAM products. Salespeople quit. Okta's CEO says the company will work on better sales integration of Auth0.
We are back! In-person events are back! The Cyberark team looks forward to welcoming you at the Hyatt Regency - Long Beach for the Impact Tour on October 20th
Join us for this one-day in-person event where you will hear from CyberArk executives and industry leaders on top security initiatives. Engage with local...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.eu, you agree to our use of cookies.