Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The U.S. chipmaker is adding hardware to the arsenal of tools available to defend against destructive and costly ransomware attacks. [Read More]
Researchers show how Google’s Titan security keys can be cloned via a side-channel attack, but conducting an attack requires physical access to a device for hours and it’s not cheap. [Read More]
Encrypted Client Hello (ECH) aims to address the shortcomings of Encrypted Server Name Indication (ESNI). [Read More]
NSA urges NSS, DoD, and DIB network owners to enhance their cybersecurity posture. [Read More]
The combined entity offers more than a half-dozen security solutions for data security risk detection and cyber-attack protection, response, and recovery. [Read More]
The business communications platform acknowledged an “incident” causing major disruptions to cybersecurity teams around the world. [Read More]
An attack method discovered in 2017 that defeats Google’s audio-based reCAPTCHA using a speech-to-text API has once again been resurrected. [Read More]
The threat actor behind the SolarWinds hack targeted a US think tank earlier this year and it used a clever trick to bypass MFA and access emails. [Read More]
Private equity firm Thoma Bravo announces strategic growth investment in Venafi and acquires a majority stake in the company in a deal valuing it at $1.15 billion. [Read More]
The new financing round was led by Canvas Ventures. Previously, Skyflow raised $7.5 million in a seed round led by Foundation Capital. [Read More]

FEATURES, INSIGHTS // Identity & Access

rss icon

Torsten George's picture
Ultimately, organizations must assume that bad actors are already in their networks. And consumers must realize they’re constant targets.
Torsten George's picture
Today’s dynamic threatscape requires security professionals to adjust to an ever-expanding attack surface.
Torsten George's picture
The tactics, techniques, and procedures (TTPs) used in the Twitter attack were not much different than in the majority of other data breaches and serve as valuable lessons for designing a modern cyber defense strategy.
Jim Ducharme's picture
Let’s look at some real-world examples of the identity management challenges remote work is creating, and at what it means to rethink identity governance and lifecycle to meet those challenges.
Torsten George's picture
The integration of identity with security is still work in progress, with less than half of businesses having fully implemented key identity-related access controls according to a research study.
Torsten George's picture
Today’s economic climate exacerbates risks of insider threats, as pending furloughs or pay cuts may tempt employees to exfiltrate data to secure a new job, make up for income losses, etc.
Torsten George's picture
With IT budgets being cut back in response to the economic contraction caused by the current health crisis, security teams need to deliver more with less.
Torsten George's picture
Static passwords lack the ability to verify whether the user accessing data is authentic or just someone who bought a compromised password.
Jim Ducharme's picture
If there’s one thing you can be sure of about user authentication methods today, it’s that determining the best choice isn’t as simple or straightforward as it used to be.
Josh Lefkowitz's picture
As the technology and tools to leverage stolen credentials advance, defenders should seek out innovative new ways to proactively flag exposed passwords leveraging insights gleaned from illicit communities and open-web dumps.