The Benefits of a Converged Identity Credential

The Benefits of a Converged Identity Credential

Many strictly regulated industries such as banking and finance rely heavily on identity and access management solutions to secure their systems and infrastructure. Unfortunately, as demonstrated by the Okta breach last year, ...
supply chain, SBOM, cybersecurity, SLSA organizations third party attacks supply chain supply chain ransomware The Kill Chain Model

Complex Supply Chain Attack Targets GitHub Developers

Unidentified threat actors used multiple tactics to launch a sophisticated software supply-chain campaign targeting developers on the GitHub platform, including members of the popular Top.gg community that includes more than 170,000 members ...
Security Boulevard
2024 IT Risk and Compliance Benchmark Report Findings: Why Unifying Risk and Compliance Work Is No Longer Optional

2024 IT Risk and Compliance Benchmark Report Findings: Why Unifying Risk and Compliance Work Is No Longer Optional

Each year, we ask over 1,000 IT and GRC professionals about their priorities for the coming year and operational aspects, like changes to budgets, staffing, challenges, and much more. What we found ...
Vector illustration of the medical team.

HIPAA Compliance: Why It Matters and How to Obtain It

What is HIPAA? The Health Insurance Portability and Accountability Act (HIPAA) of 1996 Security Rule established standards for protecting individuals’ electronic personal health information (PHI) (which includes any identifiable health information, such ...
county cyber attacks

County cyber attacks: Why cyber criminals are targeting local governments

The post County cyber attacks: Why cyber criminals are targeting local governments appeared first on Click Armor ...
China cyberespionage

US, UK Accuse China of Years-Long Cyberespionage Campaign

The United States, the UK, and other countries this week accused a state-sponsored Chinese threat group of running a massive global hacking campaign for more than a decade that targeted political figures, ...
Security Boulevard

Get Clean, Stay Clean, Optimize – The Cure for Distressed IGA Deployments

Gartner recently released a report titled “Avoid These Top 5 Mistakes When Deploying IGA” by analyst Brian Guthrie. In the report, Gartner estimates that 50% of IGA deployments are in “distress.” The ...
generative AI security, Microsoft AI cybersecurity

Embrace Generative AI for Security, But Use Caution

Generative AI will be a net positive for security, but with a large caveat: It could make security teams dangerously complacent ...
Security Boulevard
The Professionalism of Cybercrime

The Professionalism of Cybercrime

In decades past, cybercriminals were a diverse bunch.  From hacktivists and hobbyists to grudge-bearing employees and opportunists, organizations suffered at the hands of a broad range of threat actors with a full ...