Forrester recently published a report that shows over two-thirds of European security decision-makers have begun to develop a zero trust strategy, and public sector organizations are leading the way. Forrester's Tope Olufon shares the cultural and regulatory roadblocks to zero trust.
With the rapid increase in digital transformation & hybrid work, organizations are noticing that the biggest vulnerability is with legacy MFA solutions that have failed to keep pace with the ever-evolving skills, technology and persistence of today’s cybercriminals.
The key to defending your organization’s...
In the latest weekly update, John Kindervag, creator of zero trust and senior vice president of cybersecurity strategy at ON2IT, joins ISMG editors to discuss the top zero trust storylines of the year, the impact of ChatGPT on the cybersecurity industry and how to tackle MFA bypass attacks.
With so many cybersecurity technologies and services available, how do organizations get started with evaluating the managed detection and response option that is right for them? Lyndon Brown of Pondurance weighs in on how to select the MDR provider that fits your needs best.
Download this eBook to learn more...
The founding team behind SOAR vendor Demisto has started a passwordless authentication and user management platform company that caters to the developer community. Descope helps developers embed authentication in the application build process and competes with Auth0 in the CIAM space.
Identity verification and lack of WebAuthn implementation in legacy applications and smartphones are two of the biggest challenges associated with adopting FIDO authentication. Merck Germany's Andreas Pellenghar also says the current setup of jumping to a browser to log in is turning people off.
Phishing is the number one way to compromise accounts, and Google's Christiaan Brand says passkeys have emerged as a great technical solution to the issue. He wants to ensure what FIDO Alliance has built benefits and is relevant to how Google wants to see passkeys implemented for its own accounts.
Cybersecurity leaders must address high levels of complexity regarding authentication and identity security – in fact, 70% say they are overwhelmed by their authentication practices. A survey conducted by Censuswide explore why, as how to get ahead of the challenge.
Download the latest consensus from...
Security practitioners are putting cognitive psychology and customer experience at the forefront of new product development in a push for usability, says Trusona's Kevin Goldman. Getting user experience designers familiar with products allows them to speak meaningfully with the security team.
Multi-Factor Authentication (MFA) can be a highly effective way to safeguard your organization’s data, but that doesn’t mean it’s unhackable. And nobody knows that better than award-winning author and Data-Driven Defense Evangelist at KnowBe4, Roger Grimes. While researching his most recent book Hacking...
Shared workstations are low-hanging cyberattack targets. Organizations today face an evolving cyber threat landscape which continues to grow in sophistication. Insecure shared workstation practices such as password sharing and the use of sticky-notes for passwords are common in shared workstation and shared device...
The manufacturing industry has been an emerging target for cyber attacks, including sophisticated malware, ransomware, and phishing attacks. If your organization gets hacked, not only do you face highly consequential data breach costs, but you also risk loss of production time, intellectual property, and/or product...
Organizations have become unavoidable victims of ransomware attacks. This had long been foreshadowed with experts having estimated that a ransomware attack will occur every 11 seconds in 2021. When it comes to ransomware it’s not a question of if your organization will be targeted, but when.
Ransomware and its...
The global regulatory landscape is changing rapidly to keep pace with evolving cyber attacks and the accelerated digital transformation driven by COVID-19. While many industry regulations and frameworks mandate authentication to secure access and control for sensitive and critical assets, not all authentication is...
The guardrails organizations use to protect employee identities are often ineffective for contractors, business partners or vendors since they bring their own devices. Many businesses struggle to implement identity safeguards in a setting that's more heterogeneous and offers fewer controls.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.