An investigation at the U.S. Treasury Department has found that it suffered a "significant" breach as a result of the SolarWinds Orion supply chain attack, a top Democrat on the Senate Finance Committee reports. Meanwhile President-elect Joe Biden said of the attack: "I promise you, there will be a response."
Why identity is your #1 security problem
Watch the Computer Weekly interview
Bryan Glick, editor-in-chief at Computer Weekly, speaks to Okta's Max Faun about identity and security, covering:
Why 81% of cybersecurity breaches are password-related
How Customer Identity and Access Management (CIAM) can help you...
Successful customer identity management
Watch the Computer Weekly interview
Computer Weekly's Bryan Glick spoke to Max Faun from Okta to find out how you can deploy a successful identity management model.
How to make identity and access management work
Hear multiple real-world access management examples
The...
Critical authentication vulnerabilities contained in certain GE Healthcare medical imaging products could allow attackers to gain access to sensitive patient data, alter data and affect the availability of the equipment, according to new advisories from the vendor and the U.S. Department of Homeland Security.
This edition of the ISMG Security Report features an analysis of a serious Apple iOS "zero-click exploit" that could have allowed hackers to remotely gain complete control of a device. Also featured: a discussion of identity proofing challenges and a review of New Zealand's updated Privacy Act.
CIAM awareness has grown exponentially in 2020. Maturity? Not at quite the same pace. Keith Casey of Okta has authored a CIAM playbook, and in this interview offers potential benefits and challenges at each step of the journey.
Encryption keeps the internet secure, but it also gives bad actors the perfect hiding place. Join Gigamon and ISC2 for a deep dive into the latest encryption protocol, TLS 1.3, to learn what's different and what advantages it offers in the constant effort to stay one step ahead of threats.
Last week, fraudsters targeted two cryptocurrency platforms by accessing domains managed by GoDaddy, according to notices published by the victimized firms. The domain register company previously has had issues with unauthorized access.
"Has anyone witnessed any examples of criminals abusing artificial intelligence?" That's a question security firms have been raising. A new report has identified likely ways in which such attacks might occur and offers examples of threats already emerging
Blockchain technology has been floated as a solution to enable remote, electronic voting. But MIT researchers say today's paper-based systems, while imperfect, are still the most reliable way to prove to voters that their selections have been accurately cast and tallied.
As the use of telehealth continues to surge during the COVID-19 crisis, healthcare entities and their vendors must take critical steps to keep patient data private and secure, says attorney Janine Anthony Bowen.
As ransomware continues to slam organizations, a lively debate has ensued about whether ransom payments should be banned in all cases. Attempting to ban ransom payments, however, likely would only make the problem worse.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.