"There are so many basics we need to get right," says Daniel Dresner, professor of cyber security at Manchester University. In this interview, he discusses the cybersecurity practices that he recommends to make the task of securing small- to medium-sized enterprises less overwhelming.
The White House is preparing executive branch agencies to adopt "zero trust" network architectures by 2024, with CISA and the OMB overseeing the creation of technology road maps that departments must follow. This is a major component of President Biden's cybersecurity executive order.
Cryptocurrency exchange Coinbase faces potential user trust challenges after a system error led it to send out false automated security alerts to about 125,000 customers indicating their two-factor authentication settings had been changed.
Many healthcare organizations that are up for renewals of cyber insurance policies are seeing big increases in premiums and a long list of new security requirements from their carriers, says Mac McMillan, who recently returned as CEO of the consultancy CynergisTek.
Google has removed eight fake crypto-mining apps from its Play Store, but researchers at security firm Trend Micro have flagged 120 other apps on users' phones purporting to also be crypto-mining. Users paid for services the eight apps never delivered.
Healthcare organizations are an ongoing criminal
target due to the rich data they keep.
With the extensive, rapid shift of medical services to
the digital world and vast sets of health data gathered
amid the pandemic, criminals will likely seize this
opportunity to infiltrate networks and hack...
The United States federal government relies heavily on information technology (IT) to drive efficiencies and increase
public engagement. However, an increase in cyberattacks and data breaches impacting government operations creates a
storm of risks and challenges.
Download this whitepaper for more information...
Multi-factor authentication (MFA) necessitates the user to provide two or more verification factors to gain access to a
resource such as an application, an online account, or a virtual private network (VPN). It is a core component of a strong
identity and access management policy.
Download this whitepaper for...
With more than 61% of breaches attributed to stolen passwords, a password manager can go a long way in helping enterprises enhance security, say Chandan Pani, CISO at Mindtree, and Lloyd Evans, identity lead, JAPAC, at LogMeIn.
The threat of ransomware and other credential theft attacks has only grown over the last year. According to the Verizon Data Breach Incident Report, credential theft accounted for 89% of web application breaches, and phishing attacks increased by 44% across 2020. The recent attack against the Colonial Pipeline company...
CyberArk Identity Adaptive Multi-Factor Authentication (MFA) adds an extra layer of protection before access to corporate applications is granted. Leveraging device, network, and user behavior context, CyberArk MFA intelligently assigns risk to each access event and allows you to create dynamic access policies that...
The FIDO Alliance, which is developing and promoting authentication standards designed to help reduce reliance on passwords, has unveiled user experience guidelines and new FIDO2 standards enhancements, says Andrew Shikiar, executive director.
Google says it's investigating how a text advertisement was injected into SMS messages containing two-step verification security codes. The text advertisement contained a link that redirected to a VPN product from antivirus vendor Avira.
Security specialists are offering preliminary feedback on Microsoft's sneak peek at the new security measures to be included in the Windows 11 operating system, which is slated for release in December.
Election security improvements, the push for all software to ship with a "bill of materials" and the results of a long-running investigation into a lucrative digital advertising scam are among the latest cybersecurity topics to be featured for analysis by a panel of Information Security Media Group editors.