You searched for identity management/ | SC Media

Your search for identity management/ returned 8 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Last 2 years remove
Feature remove

Your search for identity management/ returned 8 results

Sort Results:

Relevant Recent
Insider Threats, Security News

Are employees the weakest (cybersecurity) link? Sometimes

The weakest link in cybersecurity, it’s often said, is the occupant of the space between the chair and keyboard. Indeed, with phishing attacks not only still seeing widespread success but actually on the uptick, employees are arguably a bigger security weakness than any type of technological vulnerability. On the flip side, an enterprise’s people can…
PowerPlayer, Security News, Women in Security

Women in Security: PowerPlayers

No doubt about it, these women, with their diverse backgrounds and different career trajectories, are powerhouses in the cybersecurity field. Dawn Beyersenior fellow, Lockheed Martin Dawn Beyer didn’t know it when she left her Florida home at age 17 some 30 years ago to go into the Air Force, but she was about to embark…
Features, Security News

2019 Tech advances

Giant leaps, small steps It’s an unfortunate fact that no security firm came up with a silver bullet to protect endpoints, the cloud, networks, IoT and mobile devices from cyberattack, but that doesn’t mean there were no technological advances made.SC Media reached out to several industry insiders to see which 2019 advances they thought deserved…
Features, Security News

Buyer beware, risk ahead

Considering a company’s cybersecurity posture should be partof M&A due diligence, but often it isn’t. Doug Olenick explainswhy that must change. Most home buyers wouldn’t think of paying top dollar for a house, no matter how beautifully designed without considering whether it sits in a crime-ridden neighborhood. Yet, venture capitalists and corporate boards, with all…
Features, Security News

Busted! 2019’s top cybercrime news

Spies, whistleblowers, students, executives and every variety of scammer. It seems no one was immune from the long arm of the law, or at least, the indictment, in 2019. Many are in custody, some have been sentenced and others remain at large.  Julian Assange  In what might have been the most anticipated arrest in 2019,…
Features, Security News

Compliance: Watch your step!

Avoiding the perilous pitfalls of compliance It’s no secret that Fortune 1000 CISOs struggle with compliance, but the pitfalls that fuel the most fury aren’t typically the ones with regulators (although regulator arguments do come in a close second). No, the battle is often internal, such as fighting over jurisdiction, with the California Consumer Privacy Act…
Privacy & Compliance News and Analysis, Security News

VPN Endgame

Choosing a virtual private network (VPN) can be difficult. Besides selecting a VPN provider, users must also choose between a paid VPN or a free VPN, among other factors. Simply picking a seemingly “free” VPN can have consequences ranging from having information logged and sold to advertisers, which may defeat the purpose of using a…
Ransomware, Security News

Ransomware: To pay or not to pay

The crudely written ransom notes in movies 20-30 years ago may have been replaced by more modern, digital missives – like a texted photo a la Liam Neeson’s “Taken” – but the message remains the same: Pay up or else.   That is the quandary business owners, municipal governments, school administrators and even librarians are now…
Next post in Ransomware