Good end user passwords begin with a well-enforced password policy
In this interview with Help Net Security, Lori Österholm, CTO at Specops Software, explains what makes passwords vulnerable and suggests some password best practices and …
Keep your digital banking safe: Tips for consumers and banks
In this interview for Help Net Security, Reza Zaheri, CSO at Quantum Metric, talks about digital banking security and what can banks, as well as consumers, do to protect their …
MFA: A simple solution to protect your identity
In this video for Help Net Security, Dan Lohrmann, Field CISO at Presidio, talks about multi factor authentication (MFA) and how everyone should consider it to protect their …
Not enough businesses have a formal ransomware plan in place
A research from Thales has found that malware, ransomware and phishing continues to plague global organizations. In fact, 21% have experienced a ransomware attack in the last …
Why low-code and identity must co-exist
Software development has emerged as a critical task for organizations looking to compete in the digital economy. It increasingly fuels innovation and even disruption. Yet, …
The challenge of planning an IAM strategy for multi-cloud environments to avoid risk
According to the Strata Identity and Forrester study, 78% of IT decision-makers said managing user identities between multiple clouds is the number one challenge. The study …
How to become a passwordless organization
In this interview with Help Net Security, Den Jones, CSO at Banyan Security, explains the benefits of implementing passwordless authentication and the process every …
How to contain a privileged access breach and make sure it doesn’t happen again
When attackers pull off a privileged access breach, they have a beachhead into your network. Regardless of whether it’s software or users that are ill-protected, threat actors …
What is fueling the adoption of passwordless authentication?
An identity and access management research report from Enterprise Strategy Group (ESG), finds organizations, frustrated with poor user experience and weak security, are moving …
Consumers fed up with passwords and KBAs, looking to voice enabled technology as the future
Pindrop released the findings of a survey that explores how 2000+ US-based consumers feel about the future of voice enabled technology and how it will impact their everyday …
The importance of balancing security requirements and employee user experience
LastPass released the findings of an IDC survey which revealed that “balancing company security requirements and the employee user experience” is the number one identity …
Devastating breaches apparently still not enough for organizations to prioritize endpoint security
Action1 released a report based on feedback from 491 IT professionals worldwide. The study explores the extent to which organizations plan to prioritize endpoint security and …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege