In the latest "Proof of Concept," Lisa Sotto of Hunton Andrews Kurth LLP and former CISO David Pollino join ISMG editors discuss the first California consumer protection fine issued against retailer Sephora, defending against new ransomware tactics, and mitigating the impact of Zelle scams.
Plan for a ransomware attack the same way you plan for a hurricane, says Paige Peterson Sconzo, director of healthcare services at security firm Redacted Inc. A cyber incident capable of disrupting network connectivity requires careful thinking about how to revert to the pre-internet era.
Ransomware remains the top security threat in 2022, as cybercriminals keep upping their malware creation, distribution and extortion game. It is especially dire for smaller companies, as a successful ransomware attack can literally put them out of business. Yet ransomware doesn’t sit at the center of most...
Perennial leaders ForgeRock, Ping Identity and IBM, along with a surging Okta, set themselves apart from the pack of CIAM vendors in the latest report by KuppingerCole analysts. Ping Identity leapfrogged ForgeRock to capture the gold in product leadership, and IBM once again took the bronze.
Probe deep enough into a once-obscure subsystem in the Windows operating system called the Common Log File System and you might come out the other end with system privileges. Researchers on Zscaler’s ThreatLabz research team say the root cause of a recent CLFS zero-day resides in base file metadata.
The threats come at a scale that no enterprise has seen before, and it is harder to recruit and retain staff to detect and respond. Yet, how can business leaders determine if an MSP is capable of adapting as their organization's security needs change? WatchGuard's Corey Nachreiner shares advice.
In the latest weekly update, ISMG editors discuss the trending themes from the 2022 ISMG Southeast Summit, plans by cryptocurrency exchange Binance to implement security measures to shore up cross-chain vulnerabilities, and the viability of a proposed data flow agreement between the U.S. and Europe.
The Biden administration will put more critical infrastructure sectors, such as water, under mandates to ensure minimal cybersecurity standards. The White House is also ramping up interest in consumer cybersecurity by initiating a labeling program for the internet of things.
With a high volume of rotating students, staff, and faculty working on-campus, remote, or in a hybrid environment, IT struggles to protect against evolving cyber attacks.
What can academic institutions do to protect students, faculty and collaborators from cybercriminals? What does it take to implement an effective...
LastPass has empowered Fresh Financials to follow best security practices when it comes to access and passwords.
Learn how LastPass helped Fresh Financials with:
Greater productivity
Improved Security
Secure Password Sharing
Each year budgets get tighter and resources slimmer as your responsibilities grow. In addition to managing your own team’s
collaboration and password management, you’re responsible for securely onboarding, offboarding, and managing faculty, staff,
students and alumni to ensure their password behaviors don’t...
The finance industry manages a high volume of risk
Businesses in the finance sector are dealing with their clients highly sensitive financial data and Personally Identifiable Information (PII) and facing strong compliance requirements as a result.
View the infographic to learn how finance is managing their Identity...
Finance, IT and media industries each have unique business needs, and as a result have different areas of focus when it comes to their IAM program. Finance is focused on reducing risk and integrations, IT is prioritizing the security components of IAM, whereas media is focused on improving employee productivity.
A...
With the increase in remote working and learning comes an increase in responsibility and risk. IT teams must select the appropriate IT stack to provide simple tools and resources that users at all levels can engage with to be productive, efficient, and secure.
When 81% of data breaches are caused by passwords,...
In contrast with other approaches, LastPass’s Federated Login has a zero-knowledge infrastructure, which means that neither party – neither LastPass nor your IDP – possesses enough information to be able to access a user’s vault.
Instead, LastPass generates special credentials for a federated login and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.