Virtualization and cloud computing adoption are elevating the importance and complexity of an age-old problem: effectively managing and protecting passwords for privileged accounts. Managing and protecting privileged credentials is
essential to reducing risk and addressing compliance
requirements. Organizations need...
Organizations handling transactions involving credit or debit cards are facing increasing pressure to comply with the Payment Card Industry Data
Security Standard (PCI DSS) version 3, which established
various requirements for safeguarding an organization's relevant systems and networks, comprising the
Cardholder...
To not only survive in the application economy, businesses are undergoing a digital transformation in which they
add digital components to all of their products and services. This
means having to develop for and integrate with a variety of APIs,
microservices, cloud applications and infrastructures-...
Files may be secure within a network using perimeter-based solutions. They may even remain secure during transit using encryption technologies. But what happens once recipients obtain and decrypt those files? How do you keep information secure as the file gets passed around or downloaded onto a flash drive? How can...
Today's cybercriminals are aware of the fraud prevention technologies deployed by most financial institutions, and they design attacks to circumvent these controls. Transaction anomaly detection and device ID approaches can be highly inaccurate, generating a large number of false positive alerts that can overwhelm IT...
This $2 billion manufacturer - with customers in the nuclear, defense, aerospace and power generation industries - chose Thycotic Secret Server to secure and manage their privileged account passwords across its global enterprise.
Download this case study to learn:
Why privileged account management is a major...
This free Privileged Password Security Policy Template gives you best-practice policies to help your organization improve IT security and demonstrate regulatory compliance. You'll save hours of effort leveraging these policies that are easily customizable in a matter of minutes.
Downloaded as an editable, easily...
An inspector general's memo that highlights three significant information security deficiencies that have plagued the U.S. Department of Labor for the past five years points out problems that most federal agencies confront.
Misusing data access privileges can pose a threat to the integrity of an organization's IT systems and the privacy of individuals. But gray areas exist, and it's not always clear cut when "unofficially" accessing protected data means users are abusing their privileges.
What's your digital identity strategy? Numerous agencies in countries across Europe - such as the Italian postal service - are creating new approaches to verifying identities and allowing them to be used as a trusted service, says CA's Paul Briault.
The norm today is a set of customers with multiple identities that interact with your brand across many channels. With that comes the challenge of serving that customer with a fluid experience across every channel.
We're just beginning to get the customer experience right across all of the different channels we...
The Target breach was the hot topic for many RSA 2014 attendees, but Gartner's Avivah Litan was already talking about the next Target - a UK retailer that may have suffered a similar hack, exposing payment card data.
The identity world circa 2015 still operates in stovepipes -- mobile, API, and web identities are often managed and secured using separate processes and technologies. The holy grail for the future of identity is a single standards-based federated Identity and Access Management (IAM) system with a high degree of...
The development of authentication technologies that could replace the password is "nearing a tipping point," but there's still several years of work to do, says Jeremy Grant, who oversees the National Strategy for Trusted Identities in Cyberspace.
Private equity firm Veritas Capital will acquire BeyondTrust, a cybersecurity software company, from venture capital firm Insight Venture Partners. Financial details of the acquisition were not disclosed.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.