Please turn on your JavaScript for this page to function normally.
Working from home
As offices emptied and remote work became the norm, security teams struggled

One Identity released a global survey that reveals attitudes of IT and security teams regarding their responses to COVID-19-driven work environment changes. The results shed …

glasses
Why you should be rushing to deploy multi-factor authentication to support remote work

With a third of the population currently working remotely and great uncertainty regarding when this situation is going to change, organizations must shift their business …

user
Do third-party users follow security best practices and policies?

Many organizations across the globe fall short of effectively managing access for third-party users, exposing them to significant vulnerabilities, breaches and other security …

flame
Impact and prevalence of cyberattacks that use stolen hashed administrator credentials

There’s a significant prevalence and impact of cyberattacks that use stolen hashed administrator credentials, also referred to as Pass the Hash (PtH) attacks, within …

identity theft
Protecting your organization against privileged identity theft

What do the top data breaches of the 21st century have in common? Privileged identity abuse. In these breach instances, well-resourced, external actors were able to gain the …

keys
Businesses are struggling to implement adequate IAM and PAM processes, practices and technologies

Businesses find identity and access management (IAM) and privileged access management (PAM) security disciplines difficult yet un-concerning. The results infer that IAM- and …

brain
AI won’t solve all of our cybersecurity problems

AI is already supporting businesses with tasks ranging from determining marketing strategies, to driverless cars, to providing personalized film and music recommendations. And …

glasses
Privileged account practices are poor, and IT security teams know it

One Identity released new global research that uncovers a widespread inability to implement basic best practices across identity and access management (IAM) and privileged …

One Identity - Balabit
One Identity acquires Balabit to bolster PAM solutions

One Identity announced the acquisition of Balabit, terms of the transaction were not disclosed. Balabit’s PAM solution provides protection from threats posed by high-risk, …

USA flag
DHS insider breach resulted in theft of personal info of staff and people involved in investigations

The US DHS Office of Inspector General (OIG) has confirmed that the “privacy incident” discovered in May 2017 resulted in the theft of personally identifiable …

Paper and phone
1 in 5 IT security pros still use paper to track accounts and passwords

Dimensional Research recently surveyed 913 IT security professionals on challenges, habits and trends related to managing access to corporate data. Among the most eye-opening …

tunnel
Are you employees snooping on the corporate network?

The overwhelming majority of employees are deliberately seeking out information they are not permitted to access, exposing a major snooping problem among today’s workforce. …

Don't miss

Cybersecurity news