identity

Phishing Increasingly Targets SaaS, Webmail
How can companies protect their sensitive data and prevent employees from falling prey to phishing attacks? In today’s digital age, virtually every organization must wage a cybersecurity battle to protect its data ...
Security Boulevard

Workarounds for Two-Factor Authentication in a Workplace That Isn’t BYOD-Friendly
Marty Puranik | | access, Authentication, identity, smartphones, two factor authentication, U2F keys, universal 2nd factor keys
Two-factor authentication can be difficult in a workplace that doesn’t allow smartphones. But it’s not impossible It’s hard to overstate how dramatically the smartphone has changed our world and our daily lives ...
Security Boulevard

Online Identity Is Important: Let’s Upgrade Extended Validation
It’s time for the CA/Browser Forum to focus on the other half of its mandate Let’s have a candid discussion about Extended Validation SSL. What’s working. What’s NOT. And what... The post ...

5 Signs of a Privileged Access Abuser
With 80% of breaches linked to privileged access credentials, effectively managing and monitoring privileged accounts often means the difference between keeping your organization secure and a catastrophic cyber incident. All it takes ...
Security Boulevard

USENIX Enigma 2019, Tejas Dharamshi’s ‘Building Identity For An Open Perimeter’
Marc Handelman | | Conferences, education, identity, Identity Cloud Services, identity management, Information Security, USENIX Enigma 2019
Thanks to USENIX for publishing the USENIX Enigma 2019 outstanding conference videos on their YouTube Channel Permalink ...

Make Digital ID Verification Part of Your CCPA Strategy
Robert Prigge | | Authentication, biometrics, California Consumer Privacy Act, CCPA, Digital Identity, identity, personally identifiable information, pii
As CCPA is poised to take effect, companies must ensure they don’t put personal information in the wrong hands The lines between the digital and physical world are continuing to blur and ...
Security Boulevard

The Top Vendor Management Processes to Automate
Tony Howlett | | Compliance, identity, risk, security, supply chain attack, Third Party Risk, vendor management
Compliance, security and risk are three reasons why vendor management is becoming a vital task Managing vendor access into your network and systems is becoming a more critical job as news about ...
Security Boulevard

Biometrics, Facial Recognition, Privacy, Security and the Law
Mark Rasch | | biometrics, bodycams, Cybersecurity, facial recognition, identity, Minority Report, social media
The danger in using biometrics and facial recognition is that they’re not always accurate. A recent article in the L.A. Times indicated that facial recognition software proposed to be used for police ...
Security Boulevard

Account Access: Resisting the Path of Least Resistance
Data breaches stemming from unauthorized account access continues to grow. Effective security strategies must resist the path of least resistance Just like doctors and lawyers, cybercriminals are professionals and have a job ...
Security Boulevard

Stopping Man-in-the-Middle Attacks With Cryptography
Shlomi Dolev | | certificate authority, encryption, identity, keyless architecture, man in the middle attacks, PKI, public-key infrastructure
Man-in-the-middle. Man-in-the-browser. IP spoofing. DNS spoofing. They’re all part of the happy family of hacks generally known as Man-in-the-middle attacks, wherein a bad actor secretly relays and possibly alters the communication between ...
Security Boulevard