Data resilience stalwarts Commvault, Rubrik and Cohesity have pulled ahead of rivals Veeam Software and Veritas atop the latest Forrester Wave. Commvault, Rubrik and Veritas took the gold, silver and bronze, respectively, for the strength of their current data resilience offerings.
The attack earlier this year that compromised systems and data at LastPass is more extensive than the password management software provider previously revealed. LastPass says the attacker downloaded from the cloud backups of multiple users' encrypted password vaults, as well as unencrypted URLs.
As global conflicts spill over into the digital realm, protecting the individual through to the enterprise has taken on a greater sense of urgency. Download the report to learn how companies responded to complex global challenges — or missed the mark — and more in Duo’s 2022 Trusted Access Report.
Palo Alto Networks' Senior Vice President and General Manager Anand Oswal discusses why a majority of customers in 2023 will adopt a zero trust strategy along with continuous authentication and identity management to ensure a consistent security architecture.
Global infrastructure services company Encora needed to secure the crown jewel systems and endpoints of its 7,300-strong workforce. The firm had to assure its Fortune 500 clients that their data was safe. Here's how a privileged access management solution and zero trust framework helped.
An important aspect of zero trust is continuous adaptive authentication, in which a user is authenticated continuously throughout the session, but implementing this technology poses many practical challenges. Three experts discuss ways to overcome technical issues and user resistance to change.
Successful account takeovers are one of the most common ways that organizations end up with attackers in their systems. But strong authentication can thwart even the most clever phishing campaigns, says Brett Winterford, regional chief security officer for APJ at Okta.
The divide between mobile app detection and IAM has fueled cyber incidents and breaches as remote work has expanded. Workers using personal smartphones don't want to install corporate endpoint management products but still need to ensure both user and device are protected, says RSA CEO Rohit Ghai.
Why is credential stuffing hard to solve? Are weak passwords the only reason behind credential stuffing attacks? Experts Sanjay Singh, head of DevSecOps at Games24x7, and Navaneethan M., CISO at Groww, explain how geo-based authentication, user behavior analytics and monitoring can detect breaches.
In this white paper, you’ll learn:
How digital transformation is prompting a shift toward passwordless authentication
The problem with passwords as a form of authentication
The business benefits of passwordless
What passwordless authentication means
How passwordless enables zero trust
The five-step path to...
In Part 3 of a three-part video series, CyberEdBoard member Andrew Abel, a cybersecurity and zero trust consultant, and Chase Cunningham, CSO at Ericom Software, describe the operational and business benefits of creating an identity strategy.
In the latest weekly update, ISMG editors discuss the implications of the former Uber CSO's guilty verdict for the rest of the industry, the growing problem of keyless car theft, and the latest progress toward a passwordless future revealed at the annual FIDO Alliance conference.
Organizations can improve security with modern authentication protocols, but the big message to the marketplace is that FIDO Passkeys give customers more convenience and deliver a consistent user experience, according to panelists on the final day of FIDO Alliance's Authenticate 2022 Conference.
In Part 2 of this video series, CyberEdBoard member Andrew Abel, a cybersecurity and zero trust consultant, and Chase Cunningham, CSO at Ericom Software, explain why organizations need to think about identities in the context of humans and nonhumans, their roles and their risks.
Multifactor authentication needs to move away from one-time passwords sent via text message and embrace modern standards that prevent man-in-the-middle attacks. Plus, excessive identity challenges online lead to 20% of e-commerce transactions being abandoned, say experts at Authenticate 2022.