The unrelenting tide of data breach and compliance challenges continues to plague an increasingly mobile workforce and business models. This has caused a dynamic transformation in the way employees, partners, contractors, and visitors are authenticated.
Download this white paper to learn more about:
The move...
The sheer number and destructive nature of recent data breaches is both alarming and discouraging - but there's still cause to be hopeful. Nearly three-quarters of these attacks were due to the same vulnerability: weak or stolen credentials.
Download this white paper to learn:
What are strong authentication...
Ignoring a breach disclosure can have ugly consequences. Case in point: Lumin PDF, a PDF editing tool, which saw data for much of its user base - about 24.3 million - published in an online forum late Monday. Data breach expert Troy Hunt says it's sign of the dysfunction in the breach disclosure process.
It's time to let your customers know that you know what they want, understand how they feel, and are dedicating yourself to building a circle of
digital identity trust.
Organizations need a platform that can seamlessly establish digital identity trust across the omnichannel customer journey. A platform through...
The Canadian government has arrested a senior intelligence official on charges of working as a mole. He was reportedly unmasked after investigators found someone had pitched stolen secrets to the CEO of Phantom Secure, a secure smartphone service marketed to criminals that authorities shuttered last year.
Even with the uptake of cloud services, many large enterprises still hold data on mainframes, says Philip MacLochlainn of IBM. But the diversity of computing environments around mainframes is rapidly changing, which increases the risk of data breaches, he explains.
Gartner named IBM a Leader in the 2018 Gartner Magic Quadrant for SIEM. Get the critical analysis you need to choose the best SIEM solution for your organization. Download the full report today.
Ahead of the release of Edward Snowden's memoirs chronicling his decision to bring illegal "big data" domestic U.S. surveillance programs to light, a former NSA intelligence specialist points out that the U.S. still lacks a whistleblowing law to protect intelligence workers who spot illegal activity.
Because banks, fintech firms, merchants and payments processors in the EU have struggled to meet the Sept. 14 deadline for compliance with the new PSD2 "strong customer authentication" requirements for electronic payments, it may take a while for European consumers to notice authentication changes.
Cybercriminals are "upping their game" by stealing and then auctioning off on the dark web administrative access credentials to healthcare organizations' clinician and patient portals, says Etay Maor of IntSights.
Identity management is no longer a simple flash of a badge at an entry desk. The layers of complexity in password management and SSO are all deterrents in the speed of authentication at the user level.
Hear insights from new research:
Business Departments presenting the highest risk exposure;
What are key...
Modern IT teams must maintain compliance with an evolving set
of regulatory standards, track and secure sensitive data across
endpoints, and manage a dynamic inventory of physical and
cloud-based assets, all while fulfilling an increasingly common
executive mandate to make technology an enabler for...
Alice Bluebird, a resourceful, independent security analyst, hunts a gang of hackers who are after the recipes of the state-of-the-art craft beer brewery-Frothly. Join Alice in her work and try to solve the mystery of the security breach.
From IT managers to the most savvy SOC analysts, discover how machine data...
The technology of IT monitoring is progressing rapidly, which is largely due to machine learning and predictive analytics (also known as "predictive" or "predictive analysis"). If you still rely on a legacy IT solution, you're missing out on much more than just something totally modern. The benefits of a New IT...
All enterprises need to grant their employees access to the right digital and physical resources. They also need to digitize their businesses, protect their data, and comply with various local and global regulations.
Nexus helps resolve these identity challenges that most enterprises face, regardless of the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.co.uk, you agree to our use of cookies.