You searched for identity management/ | SC Media

Your search for identity management/ returned 75 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Last 2 years remove
Post remove

Your search for identity management/ returned 75 results

Sort Results:

Relevant Recent
The threat of overprivileged accounts.
InfoSec Insider

The Threat Posed by Overprivileged Identities

Organizations have struggled to gain control over privileged identity management—a challenge that has tripped up many security and risk departments and has caused major cyber incidents. If the title of this article caught your eye, chances are you’re grappling with this issue and are looking for some insights that will make your life a little easier.

Perspectives

Legacy IT: The hidden problem of digital transformation

Legacy IT has become the dirty little secret of digital transformation. These systems, which include servers, OSes, and applications, are relied on by almost every organization for business-critical activities – and many CISOs struggle to protect them from attackers.
Events, Security News

SC Media opens nominations for the 2020 SC Awards

SC Media is announcing a call for nominations for the 2020 SC Awards, which will be bestowed to the winners during a gala dinner celebration, to be held in February 2020 in San Francisco. The cybersecurity community is encouraged to submit nominations for its best and brightest companies, technologies and individuals in the following categories:…
VMware advisory warns users to patch critical issue in product
Network Security, Vulnerabilities

VMware begins patching process for Linux SACK vulnerabilities

VMware is instructing users to be on the lookout for software patches for 31 products that are affected by two vulnerabilities associated with the Linux kernel implementation of TCP Selective Acknowledgement (SACK). The two flaws, SACK Panic (CVE-2019-11477) and SACK Excess Resource Usage (CVE-2019-11478), were originally found and disclosed by Netflix researchers, along with two…
Reboot Leadership Awards 2019

Roger Grimes – KnowBe4

Why Nominated: Roger Grimes is a 30-year computer security professional and prolific author frequently consults with the world’s largest and smallest companies and militaries. Profile: In his role as an advocate, Roger Grimes spreads his message on the importance of cybersecurity to the community at conferences such as RSA, Black Hat, Tech Mentor, Tech Ed, SecTOR, AusCERT…
Mobile/End Point Security, Privacy & Compliance News and Analysis, Security News

IoT bill would require gov’t use devices meeting cybersecurity standards

If passed, the Internet of Things Cybersecurity Improvement Act of 2019, introduced in the Senate and House Monday, would compel the U.S. government to purchase only devices that meet the legislation’s minimum security requirements “While I’m excited about their life-changing potential, I’m also concerned that many IoT devices are being sold without appropriate safeguards and protections in…
Next post in Security News