An operational risk management framework should live at the core of every effective information security program and strategy. Rather than security professionals scrambling to secure every application and system with the highest grade of technologies and drowning their resources, risk management enables better...
About 25,000 email addresses and passwords that are apparently for staff at the World Health Organization, the Gates Foundation, the U.S. National Institutes of Health and other organizations have been dumped online, according to the Washington Post.
With $30 million in funding, Silicon Valley icons Jim Clark and Tom (TJ) Jermoluk launched Beyond Identity, a new identity management platform that promises "the end of passwords." Jermoluk discusses the technology and how this is a continuation of what he and Clark started 25 years ago.
In IT Security, we're lucky to stay one step ahead of the bad guys. To give you a half-step more advantage, a panel of Splunk IT security experts has assembled a fresh look at emerging threats - and one major emerging solution.
Learn how to best protect your organization, and your data, against a fast-approaching...
The stuck-at-home chronicles have fast become surreal, as remote workers face down a killer virus on the one hand and the flattening of their work and personal lives on the other. To help, many have rushed to adopt Zoom. And for many use cases - hint: not national security - it is a perfectly fine option.
Security technologies are evolving at an incredible pace to protect the dynamic business IT environment against an innovative and agile threat landscape. Unfortunately, the staple of security testing is still based on pen-testing which can take several weeks, even months from initial engagement to the final report. A...
In IT Security, we're lucky to stay one step ahead of the bad guys. To give you a half-step more advantage, a panel of Splunk IT security experts has assembled a fresh look at emerging threats - and one major emerging solution.
Learn how to best protect your organization, and your data, against a fast-approaching...
Account Takeover is now a ubiquitous term, and ATO prevention has become a high priority for cybersecurity leaders. But most of the effort is put toward thwarting high-volume, automated credential stuffing. Less understood are "targeted ATO attacks." Highly effective and difficult to detect, they cause huge damage to...
Passwords are the access point to almost every system in our environment. Can they ever truly be replaced? John Bennett of LogMeIn talks about the steps necessary to create a secure, passwordless login experience.
SpyCloud is out with its annual credential exposure report, and the bad news is: Password reuse continues to leave enterprises open to breach and account takeover. Chip Witt of SpyCloud shares some of the key takeaways and analysis.
Cyberattacks leverage faster tools and exploit known weaknesses to get around even the strongest of passwords. Pairing them with additional technology and authentication factors is essential. But what to protect, and what variation of multifactor authentication will thwart threats best, depends on your...
Every year, the SpyCloud Credential Exposure Report examines the data cybercriminals have been sharing over the last year and what it means for enterprises and consumers. Our 2020 report shows that password reuse continues to be a serious problem, leaving enterprises and their customers vulnerable to account takeover...
Time for a fresh edition of "learn from how others get breached" focusing on Equifax. The goal is not blame, but rather to highlight specific missteps so others can avoid making the same mistakes. The Equifax breach offers a plethora of takeaways to help organizations better repel attackers.
Security researchers have found that the developers of the Emotet Trojan have created a new way to spread it to more victims - attackers are using unsecured WiFi networks as a way to deliver the malware to more devices.
Scammers are blackmailing users of infidelity-focused dating site Ashley Madison using leaked data from 2015, warns security firm Vade Secure. The sextortion shakedown is a reminder that while data breaches may be a blip for corporate entities, for individual breach victims, the impact may last forever.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.