Cybersecurity
The Benefits of a Converged Identity Credential
Many strictly regulated industries such as banking and finance rely heavily on identity and access management solutions to secure their systems and infrastructure. Unfortunately, as demonstrated by the Okta breach last year, ...
Complex Supply Chain Attack Targets GitHub Developers
Unidentified threat actors used multiple tactics to launch a sophisticated software supply-chain campaign targeting developers on the GitHub platform, including members of the popular Top.gg community that includes more than 170,000 members ...
2024 IT Risk and Compliance Benchmark Report Findings: Why Unifying Risk and Compliance Work Is No Longer Optional
Each year, we ask over 1,000 IT and GRC professionals about their priorities for the coming year and operational aspects, like changes to budgets, staffing, challenges, and much more. What we found ...
Telegram Privacy Nightmare: Don’t Opt In to P2PL
Scary SMS shenanigans: Avoid Telegram’s new “Peer-To-Peer Login” program if you value your privacy or your cellular service ...
HIPAA Compliance: Why It Matters and How to Obtain It
What is HIPAA? The Health Insurance Portability and Accountability Act (HIPAA) of 1996 Security Rule established standards for protecting individuals’ electronic personal health information (PHI) (which includes any identifiable health information, such ...
County cyber attacks: Why cyber criminals are targeting local governments
The post County cyber attacks: Why cyber criminals are targeting local governments appeared first on Click Armor ...
US, UK Accuse China of Years-Long Cyberespionage Campaign
The United States, the UK, and other countries this week accused a state-sponsored Chinese threat group of running a massive global hacking campaign for more than a decade that targeted political figures, ...
Get Clean, Stay Clean, Optimize – The Cure for Distressed IGA Deployments
Gartner recently released a report titled “Avoid These Top 5 Mistakes When Deploying IGA” by analyst Brian Guthrie. In the report, Gartner estimates that 50% of IGA deployments are in “distress.” The ...
Embrace Generative AI for Security, But Use Caution
Generative AI will be a net positive for security, but with a large caveat: It could make security teams dangerously complacent ...
The Professionalism of Cybercrime
In decades past, cybercriminals were a diverse bunch. From hacktivists and hobbyists to grudge-bearing employees and opportunists, organizations suffered at the hands of a broad range of threat actors with a full ...