Mergers and acquisitions, along with cloud adoption, are rapidly changing the pharmaceutical industry. Sandy Dalal of Allergan talks about how Okta identity and access management brings security stability and supports a zero trust framework.
The promise of an integrated identity and risk platform that continuously monitors a myriad of suspicious activities across channels and applications, and dynamically orchestrates authentication and authorization actions has been around for over a decade. Many organizations and technology vendors have attempted to...
A massive botnet attack earlier this year utilized more than 400,000 connected devices over the course of 13 days, according to researchers at the security firm Imperva.
Many organizations use Active Directory as their domain network management tool of choice. But security experts warn that without locking down and regularly auditing AD, the ease of use that it provides to network administrators can also be tapped by hackers. Start here for essential defenses.
Warning: Attackers are abusing poorly secured and managed implementations of Microsoft Windows Active Directory to hack organizations and distribute ransomware. Fewer old operating systems and greater Active Directory security knowledge are helping mitigate the threat. But experts say more must be done.
A major misconception about cloud IAM is that it's easy to implement, says Mark Perry, CTO for APAC at Ping Identity. Implementation poses challenges, and cloud IAM must be carefully integrated with other systems, he says.
With continued data breaches occurring, and heavy fines making headlines, the time is now to think more proactively about applying granular access controls to protect your unstructured data from accidental and malicious data loss.
In this webinar, we will look at typical use cases and demands - in particular data...
More often than not, technical aspects of data breaches are the centerpiece of any response - but its actually the non-technical aspects that are even more threatening and usually overlooked. Powerful tools such as identity are critical in bolstering your defenses - and the untapped market potential is consistently...
SSH keys are widely used to provide privileged administrative access but are routinely untracked, unmanaged and unmonitored. Mike Dodson of Venafi outlines an approach for better key protection.
Website breaches are becoming a daily occurrence. Organizations, entrusted with millions of customer data points, are failing to protect consumers adequately and as a consequence, losing valuable data.
Despite the expectation that companies should be prepared for both accidents and deliberate attacks, there is a...
2018 saw a further increase in the frequency and complexity of cyberattacks being levelled at organizations and in several cases, resulted in high-profile customer data breaches. Global companies such as Facebook, Uber and Quora all fell victim to cyberattacks that left them facing huge financial costs and...
New Ensighten research shows 83% of global organizations anticipate a potential data breach - yet two-thirds are not armed for prevention against this cyber threat. The risks revealed by this research into these concerning approaches to data security vulnerabilities cannot be allowed to persist, lest they threaten...
The traditional IAM strategy has been to tie individual users with a unique device. But that doesn't work in healthcare settings, where doctors and nurses often share multiple devices. Jigar Kadakia of Partners HealthCare talks about how he approaches this critical challenge.
Healthcare information is a prime target for malicious attackers because it has a high value on the black market, says Amanda Rogerson of Duo Security, who calls for adoption of a "zero trust" model to boost security.
A new study sizes up whether healthcare organizations are well prepared to battle evolving cyberthreats. Learn about the state of progress in adopting best security practices.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.