In the latest "Proof of Concept," Lisa Sotto, Jeremy Grant and ISMG editors discuss the significance of Apple, Google and Microsoft supporting the FIDO protocol's passwordless sign-in standard, progress made on Biden's cybersecurity executive order and updates on U.S. cybersecurity and privacy laws.
Identity experts urge the Biden administration to accelerate the deployment of mobile driver's licenses and ensure identity theft victims get direct assistance. These are among the four items experts say must be added to an upcoming executive order focused on preventing and detecting identity theft.
Private equity giant Thoma Bravo has agreed to purchase identity security powerhouse SailPoint for $6.9 billion in the sixth-biggest cybersecurity acquisition of all time. The deal will give SailPoint the flexibility needed to support its customers, expand its markets and accelerate innovation.
Keeping up with myriad data privacy and information security regulations has never been easy. Security mandates are complicated and constantly evolving. Adding to the complexity: organizations often face deadlines to meet compliance objectives – and fast.
Across industries and regions, compliance frameworks...
Okta says it should have notified customers of a breach earlier and that Lapsus$ compromised a laptop belonging to Sitel, a third-party customer support firm, via remote desktop protocol, enabling it to infiltrate Okta's network. Cybersecurity experts discuss the impact of the breach and offer mitigation advice.
In the coming weeks, U.S. President Joe Biden will announce a new executive order to prevent and detect identity theft involving public benefits. Jeremy Grant, coordinator of the Better Identity Coalition, discusses the challenges ahead for the government in combating criminal and identity fraud.
Organizations must use every available resource to protect against the latest cyberattacks, the persistent nature of advanced threats, as well as the ease with which malware can cripple an entire network.
One of the most important — and often overlooked — resources that organizations can tap into to solve these...
After a merger or acquisition, integration of Identity and Access Management systems is one of the most pressing tasks for the IT team. For all the users, old and new, IT personnel need to give the right people the right access to the right resources, regardless of where the user’s identity is stored. When a large...
There is no successful digital business without utilizing digital identities. Digital identities of consumers, customers, business partners, employees, but also devices, things, or services are at the core of the digital business. Unfortunately, most digital identities reside in siloes. Building a modern identity...
One of the world’s leading hotel chains has nearly two hundred thousand employees and 7000 locations across the globe. When the IT team was tasked with IAM modernization to enable the company’s digitization goals, they faced a complex challenge. See how they chose to simplify their existing identity infrastructure...
As Western cybersecurity officials warn that Russia's Ukraine invasion poses an elevated cybersecurity risk to all, kudos to Cloudflare, CrowdStrike and Ping Identity for offering free endpoint security and other defenses to the healthcare sector and power sectors, for at least four months.
Machine identity management has become a top priority as organizations evaluate new and alternative approaches to securing a growing, cloud-driven, distributed environment. Digitization has led to massive growth in machines or digital assets, opening up a vast attack surface. Securing these distributed assets and...
Implementing a comprehensive identity security program might
be described as a Holy Grail. But what does it mean to reduce the
complexity for organizations and their employees?
Download this master compendium that highlights key topics around:
Modernizing Identity & Access Management
Identity & the new role of...
It has been said that as soon as you connect to the internet, your
infrastructure is potentially breached. Now there is growing recognition
that any network should always be treated as compromised. It should be
assumed that threats, external and internal, are always present, even on
what was previously defined as...
Amid the current ransomware surge, it's time for the principle of least privilege to meet endpoint security and be a new foundational security control, says David Higgins of CyberArk. He outlines the cybersecurity use cases and potential business benefits.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.eu, you agree to our use of cookies.