Forrester recently surveyed 100 IT and IT security executives to understand the approaches and challenges your peers experience with user authentication and access management.
Curious to hear how you compare to your peers? Read the Forrester Report.
The apps financial services organizations depend on to fuel productivity, innovation and success are truly unique. But how is the industry evolving to adopt new technology that can offer the reliability, security and compliance it requires?
Download Okta's annual Businesses @ Work report which provides an in-depth...
As customers spend more and more money online each year, the opportunities for fraud increase in parallel; experts project a loss of $24 billion to payment card fraud by the end of 2018. Payment card fraudsters rely on a sophisticated ecosystem and support network that provides a wide range of credit card details,...
This case study illustrates how Digital Shadows helped the head of threat intelligence at a bank discover a user on the dark web claiming to be a bank employee selling access to high net worth individual's accounts. The fact that the seller appeared to be an employee, this threat was of heightened priority to this...
The annual Infosecurity Europe conference returns to London this week, with a focus on the latest cybersecurity trends and essential practices for organizations. Hot topics range from artificial intelligence and breach response to GDPR and battling cybercriminals and nation-states.
Leading the latest edition of the ISMG Security Report: Cybersecurity expert Brian Honan provides insights on why organizations that are not yet compliant with GDPR need to focus on several key steps. Also: An assessment of the progress women are making in building careers in information security.
Cybersecurity challenges and solutions have evolved greatly since 2002. And so has the Executive Women's Forum, which was founded that year to advance female leaders in the profession. Founder Joyce Brocaglia reflects on the forum's accomplishments and challenges.
What happens if organizations that must comply with GDPR have yet to achieve compliance, despite having had two years to do so before enforcement began? Don't panic, says cybersecurity expert Brian Honan, but do be pursuing a data privacy transparency and accountability action plan.
Leading the latest edition of the ISMG Security Report: Reports on the impact enforcement of the EU's General Data Protection Regulation, which began Friday, will have on the healthcare and banking sectors. Plus an assessment of GDPR compliance issues in Australia, which offer lessons to others worldwide.
Researchers have discovered two new Spectre/Meltdown variants: variant 3a, a rogue system register read, and variant 4, a speculative store bypass. Some AMD, ARM, Intel and IBM Power chips have the flaws, which attackers could exploit to steal sensitive data. Some fixes have already been shipped.
Early experiments are demonstrating how blockchain, the distributed and immutable ledger behind virtual currencies, potentially could play an important role in identity management, says Avivah Litan, a Gartner Research analyst.
Patching a content management system has never been a straightforward affair, and the carnage from back-to-back critical vulnerabilities in the Drupal CMS continues to play out. Unpatched, hacked Drupal sites are delivering virtual currency miners, and in some cases malware.
Cyber security awareness is growing as more businesses learn that their networks are vulnerable to an attack. The emerging consensus is that the IT department alone cannot handle security; all employees, especially C-level executives, have a part to play.
In fact, executives are responsible for not only the security...
In many instances, we learn that companies have an incident response plan that looks good on paper but not in practice. The plan cannot just live in a manual that sits on a shelf. It needs to be a strategy that everyone agrees to, can evolve over time, is rehearsed often and can be carried out immediately when the...
Every security organisation endeavors to shift from a reactive state of constant busy work towards a state of proactive security.
This whitepaper reviews how organisations can work towards this proactive state by integrating the entire security operations lifecycle, from assessing, preparing for, detecting,...