https://lh3.googleusercontent.com/proxy/8qECupKLM_-G38tlKLQ9O6cW-WShm_9qTpVuKdvmlRMhaOxDESKFKwgZkUBJ_fV0FYvHhgnwxvIZletVqc93CrA2eXfg7pjBJqn8D074yQyteRU

Problems Facing IT Departments

No one can deny that the IT department is tasked with monumentally important functions. Without an efficient and secure network, nearly every organization would fall apart. IT has to find cost effective ...

A WebLogic Vulnerability Highlights the Path-Based Authorization Dilemma

A WebLogic server vulnerability fixed by the October CPU has come under active exploitation after a Vietnamese language blog post detailed the steps needed to bypass authentication and achieve remote code execution ...
behavioral biometrics

Behavioral Biometrics: People-Friendly Zero Trust

Behavioral biometrics bring a better user experience to authentication COVID-19 may very well redefine our work, our homes, our very lives for the foreseeable future. As we near the end of 2020, ...
Security Boulevard
MS teams

MS Teams: The Gateway Drug to Security Chaos

We all know the COVID-19 pandemic forced organizations to rapidly accelerate their adoption of collaboration solutions. For organizations already using Office 365 or Microsoft 365, Microsoft Teams was a readily available answer ...
Security Boulevard

Catch Me If You Can: How to Protect Your Identity in the Modern Era

When Leonardo DiCaprio played famed conman Frank Abagnale, it awakened many in the con experience. In the movie Catch Me If You Can, DiCaprio (as Abagnale) conned flight attendants (pretending to be ...

Defending an Increasingly Blurred Perimeter with ZTNA and SASE

Forcepoint hosted the Cyber Voices Zero Trust Summit today. It was a virtual conference similar to the SASE CyberSummit they held back in June. One of the sessions that stood out was ...

Connectivity Counts: Why Smaller FSIs Worry about Secure, Remote Access

Nimble but Smaller FSIs Adapt to Change Quickly, but Have Fewer Resources  Not every financial service institution (FSI) is the size of a global bank with hundreds of thousands of workers. Frequently, boutique ...
CIAMBlog, 10.26.png

4 Tips for a Great CIAM RFP

| | CIAM, identity management, rfp
Requests for proposals (RFPs) are a good way to start the product evaluation process as well as help clarify the project's scope and requirements. RFPs give you the ability to compare products ...
CyberattacksBlog_10.26_pic2.png

Cyberattacks Evolve as the Hospitality and Travel Industry Adapts

While the world fights against the COVID-19 pandemic, cybercriminals are out in full force with a multitude of scams designed to take advantage of the confusion and panic. COVID-19 has -- by ...
1

Accelerating Security and the Cloud With Bitglass and AWS Global Accelerator

Businesses’ IT infrastructures have undergone critical changes in the way that they store data and extend access to resources for users. Cloud, BYOD, and remote work have changed things forever. Where the ...