Identity & Access
Problems Facing IT Departments
No one can deny that the IT department is tasked with monumentally important functions. Without an efficient and secure network, nearly every organization would fall apart. IT has to find cost effective ...
A WebLogic Vulnerability Highlights the Path-Based Authorization Dilemma
A WebLogic server vulnerability fixed by the October CPU has come under active exploitation after a Vietnamese language blog post detailed the steps needed to bypass authentication and achieve remote code execution ...
Behavioral Biometrics: People-Friendly Zero Trust
Behavioral biometrics bring a better user experience to authentication COVID-19 may very well redefine our work, our homes, our very lives for the foreseeable future. As we near the end of 2020, ...
MS Teams: The Gateway Drug to Security Chaos
We all know the COVID-19 pandemic forced organizations to rapidly accelerate their adoption of collaboration solutions. For organizations already using Office 365 or Microsoft 365, Microsoft Teams was a readily available answer ...
Catch Me If You Can: How to Protect Your Identity in the Modern Era
When Leonardo DiCaprio played famed conman Frank Abagnale, it awakened many in the con experience. In the movie Catch Me If You Can, DiCaprio (as Abagnale) conned flight attendants (pretending to be ...
Defending an Increasingly Blurred Perimeter with ZTNA and SASE
Forcepoint hosted the Cyber Voices Zero Trust Summit today. It was a virtual conference similar to the SASE CyberSummit they held back in June. One of the sessions that stood out was ...
Connectivity Counts: Why Smaller FSIs Worry about Secure, Remote Access
Nimble but Smaller FSIs Adapt to Change Quickly, but Have Fewer Resources Not every financial service institution (FSI) is the size of a global bank with hundreds of thousands of workers. Frequently, boutique ...
4 Tips for a Great CIAM RFP
Requests for proposals (RFPs) are a good way to start the product evaluation process as well as help clarify the project's scope and requirements. RFPs give you the ability to compare products ...
Cyberattacks Evolve as the Hospitality and Travel Industry Adapts
While the world fights against the COVID-19 pandemic, cybercriminals are out in full force with a multitude of scams designed to take advantage of the confusion and panic. COVID-19 has -- by ...
Accelerating Security and the Cloud With Bitglass and AWS Global Accelerator
Businesses’ IT infrastructures have undergone critical changes in the way that they store data and extend access to resources for users. Cloud, BYOD, and remote work have changed things forever. Where the ...
