Please turn on your JavaScript for this page to function normally.
Active Directory
Active Directory control: How adversaries score even bigger goals via attack paths

Microsoft Active Directory and Azure Active Directory are directory services products used for identity and access management at most major enterprises all over the world. All …

Dirk Jan Koekkoek
The antidote to brand impersonation attacks is awareness

In this interview with Help Net Security, Dirk Jan Koekkoek, VP, DMARC at Mimecast, talks about the growing threat of brand impersonation attacks, their increasing level of …

account
Unauthorized account openings increased by 21% in the last 12 months

Fifty-eight million consumers had a new account opened without their authorization in the last 12 months, a 21% increase compared to 2020, yet less than half of Americans know …

passwordless
Biometrics emerging as the preferred identity verification option for digital consumers

Onfido announced the results of a global study with Okta which revealed that businesses have just 10 minutes to set up digital accounts or risk losing consumer trust. The …

AWS
AWS ransomware attacks: Not a question of if, but when

Ermetic announced the results of a study about the security posture of AWS environments and their vulnerability to ransomware attacks. In virtually all of the participating …

user
How much trust should we place in the security of biometric data?

An increasing number of people around the world are being displaced by factors such as climate change, natural disasters, and wars. The people attempting to cross …

lock
The biggest problem with ransomware is not encryption, but credentials

With each passing day, the threat of ransomware increases in frequency, sophistication, and effectiveness. What started as a simple annoyance scheme to collect a ransom has …

identity
The digital identity imperative

The ever-evolving shift to digital means that most of our day-to-day activities are carried out online. We’re now accustomed to simply toggling through a few apps to book a …

fix
Why should enterprises invest in machine identity management tools?

More than 60% of organizations don’t hold full awareness of certificates and keys across their digital assets, according to a research from AppViewX. Over the course of …

Ben King
Hybrid work: How do you secure every identity on your network?

As organizations around the world continue optimizing their hybrid work environments, many are struggling to stay productive without compromising on security. In this …

zero
Zero trust network access: A safe journey to a better employee experience

Trust is a foundational element of society. When engaging in any social or commercial interaction, we need to be able to trust the people we deal with. And yet, one of …

biohazard
Houdini malware returns, enterprise risk assessment compromised by Amazon Sidewalk

Cato Networks announced the results of its analysis of 263 billion enterprise network flows between April and June 2021. Researchers showed a novel use of Houdini malware to …

Don't miss

Cybersecurity news