Who is attempting to extort Australian health insurer Medibank? Why did Medibank tell its attackers it wouldn't pay a ransom? Will this deter future cyber extortionists? Here are a few thoughts on the high cybercrime drama playing out.
If remote access to corporate networks is only as secure as the weakest link, only some dreadfully weak passwords now stand between hackers and many organizations' most sensitive data, according to new research from Rapid7 into the two most widely used remote access protocols - SSH and RDP.
The healthcare sector has long faced unique challenges involving identity and access management, but the novel coronavirus pandemic and various other key drivers are accentuating those issues, says Rebecca Archambault, senior director analyst at Gartner.
Passwords are supported everywhere. But, says Andrew Shikiar, executive director of the FIDO Alliance, "they have been proven time and time again to simply be unfit for today's networked economy." In this episode of "Cybersecurity Unplugged," Shikiar discusses how to move beyond passwords.
Password manager stalwart LastPass acknowledged Thursday that a threat actor gained unauthorized access to its source code and proprietary technical information. The attacker does not appear to have gained access to customer data or encrypted password vaults.
Calling all Apple users: It's time to once again patch your devices to protect them against two zero-day vulnerabilities that attackers are actively exploiting in the wild to take complete control of devices. While there's no need to panic, security experts advise moving quickly.
The Cl0p ransomware group has been attempting to extort Thames Water, a public utility in England. Just one problem: the group attacked an entirely different water provider. Through ineptitude or outright lying, this isn't the first time that a ransomware group has claimed the wrong victim.
Organizations use a lot of different application types, all of which need secrets to do their jobs. And as more applications are developed across the various types, security teams have more secrets that they need to manage, rotate and audit.
Watch this video and see why enterprises need to prioritize securing application secrets across DevOps pipelines and cloud-native apps, as well as for robotic process automation (RPA) bots and virtual agents, and more.
Modern organizations have many different application types across their organization – from DevOps pipelines and cloud-native apps to robotic process automation bots and static homegrown apps. How do you keep the secrets used by all these different types of applications safe from attackers?
How can organizations secure their workforces against identity-related attacks, when employees are accessing applications from a variety of locations and devices? In this video, Udi Mokady, Founder, Chairman and CEO of CyberArk, shares his perspectives.
A future without passwords is not far off. This is bad news for cybercriminals who aim to steal credentials and good news for your IT team – which spends way too much time handling password resets, account unlocks, and other password-related requests. Find out what alternative authentication methods are available...
The report from Israeli publisher Globes that CrowdStrike plans to spend $2 billion buying one or more Israeli cybersecurity companies sent shockwaves through the industry. Here's a look at six security startups with a large presence in Israel that could be a good fit for CrowdStrike.
Thales plans to enter the customer identity and access management market through its purchase of an emerging European CIAM player. The French firm plans to capitalize on OneWelcome's strong product by extending its footprint beyond Europe and into North America and Asia-Pacific.
As this technology is automated, it can also scan more accesses because a new rule doesn’t need to be created for each access. You can jump from a 1% audit rate to a 99% audit rate.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.