identity and access
Embedding Security Into Cloud Operations: 5 Key Considerations
Gilad David Maayan | | Cloud Operations, Cybersecurity, DevSecOps, identity and access, Software Security
Cloud operations involves more than technology; it's about a culture that values agility, flexibility and continuous improvement ...
Security Boulevard
Stressed Employees and Insider Threats Put Data in Danger
The majority of data breaches involved the human element, a catchall term for company insiders who compromise company and customer data ...
Security Boulevard
Concerns About Infostealer Malware on the Rise
A SpyCloud report found more than half of respondents are extremely concerned about their ability to thwart attacks that exfiltrate authentication data ...
Security Boulevard
3 Ways to Streamline Auth, Access & Security for Oracle EBS
Oracle E-Business Suite (EBS) is a popular ERP tool for business and financial operations that uses a combination of usernames and passwords to authenticate users. This form of authentication has known weaknesses ...
Security Boulevard
Weak Passwords Offer Easy Access to Enterprise Networks
Nathan Eddy | | Authentication, business email compromise, credential theft, enterprise, identity and access, passwords
Poor password practices continue to put businesses at risk, with nearly 90% of passwords used in successful attacks consisting of 12 characters or less, indicating additional security measures are required to protect ...
Security Boulevard
Organizations Lack Visibility Into Cloud Access
Do you know who is accessing your data in the cloud? According to a study conducted by Laminar, one in three respondents didn’t know if a third-party actor was able to successfully ...
Security Boulevard
Can FIDO Passkeys and Accountability Coexist?
The Fast Identity Online (FIDO) alliance is an industry association spearheading efforts to reduce and eventually eliminate password use. To this end, FIDO promulgates standards and creates protocols intended to strengthen authentication ...
Security Boulevard
Attackers Work Hard to Engineer Trust; SharePoint, OneDrive Accounts at Risk
A pair of reports released this month underscore just how successful phishing is and the lengths to which adversaries will go to con victims. In the first report, Trend Micro said it ...
Security Boulevard
Strata Identity Proposes Standard to Simplify Identity Management
Strata Identity today launched an open source project that makes it possible to employ a common policy format to declaratively define identity and access policies—without requiring an agent, proxy software or some ...
Security Boulevard
Attivo Networks Extends Microsoft Active Directory Protection
Michael Vizard | | Active Directory, Attivo Networks, Enterprise IT Security, identity and access, wiper malware
Attivo Networks today announced it has extended Active Directory protection by adding an ability to more efficiently detect identity-based attacks at the domain controller level from all endpoints. Carolyn Crandall, chief security ...
Security Boulevard