Today’s organizations face a complex cybersecurity landscape, with hybrid networks pummeled by ever-morphing threats. The first chapter of this year is peppered with high-profile data breaches at T-Mobile, MailChimp, PayPal, and Chick-fil-A. Global geopolitical...
Cybersecurity
Is Your IAM Program Held Up by These Common Blockers?
Digital transformation initiatives demand new ways of handling user interaction with data—from zero-trust implementation to cloud migration and beyond. Identity forms the core of these initiatives and, together with access control, enables data protection across...
3 Ways to Avoid Online Fraud This Holiday Shopping Season
The holiday season is a time for relaxing, spending time with family, and for many, exchanging gifts. Unfortunately, procuring gifts for your loved ones may come with a few extra gifts: identity and financial fraud. Identify theft and financial fraud spike...
Experts Share Top Points for Cybersecurity Awareness Month and Beyond
Cybersecurity Awareness Month may be drawing to a close, but threat actors don’t care—their attacks aren’t constrained to a season. We asked a few of our experts for the top aspects of security awareness they would like organizations to keep in mind this awareness...
5 Things New Research Tells Us About Organizations’ Zero-Trust Journeys
Zero trust is no longer just a theoretical security buzzword. Since the onset of the pandemic and the demise of the network-based perimeter, more organizations than ever have been moving to zero trust to more tightly lock down assets and resources. More...
Think Outside The Box For A Better NIST 800-53 Assessment
There’s a recognized truth across the cybersecurity industry: you can’t protect what you don’t know. Added to that is the fact that you can’t know what you don’t know. Industry best practices and cybersecurity frameworks reconcile these two for productive outcomes and...
IBM Cost Of A Data Breach Report: What You Need To Know
Prices are rising everywhere and the cost of a data breach is no exception. According to the new IBM/Ponemon Cost of a Data Breach report, the average global overall cost of experiencing a data breach is now at an all-time high of $4.35 million, a 13% increase...
Stealing the Bank Vault Codes via Insecure Microsoft Default Settings
Fun with forced authentication inside a financial services network. Sometimes in infosec, it’s the little things that matter. This truth was underscored once again during a recent penetration test of a financial services client. A combination of somewhat minor issues—...