You searched for identity management/ | SC Media

Your search for identity management/ returned 14 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Last 2 years remove
Features remove

Your search for identity management/ returned 14 results

Sort Results:

Relevant Recent
Insider Threats, Security News

Are employees the weakest (cybersecurity) link? Sometimes

The weakest link in cybersecurity, it’s often said, is the occupant of the space between the chair and keyboard. Indeed, with phishing attacks not only still seeing widespread success but actually on the uptick, employees are arguably a bigger security weakness than any type of technological vulnerability. On the flip side, an enterprise’s people can…
PowerPlayer, Security News, Women in Security

Women in Security: PowerPlayers

No doubt about it, these women, with their diverse backgrounds and different career trajectories, are powerhouses in the cybersecurity field. Dawn Beyersenior fellow, Lockheed Martin Dawn Beyer didn’t know it when she left her Florida home at age 17 some 30 years ago to go into the Air Force, but she was about to embark…
Cybercrime, Security News

Bullish on cybercrime

As the U.S. economy takes investors on a wild ride, turning all the usual indicators topsy-turvy and sparking concern that the bear will usurp the bull, one market seems to be on a perpetual upswing — cybercrime. Threat intelligence researchers agree that adversaries are well connected in the sophisticated virtual labyrinths of the dark web,…
Features, Security News

2019 Tech advances

Giant leaps, small steps It’s an unfortunate fact that no security firm came up with a silver bullet to protect endpoints, the cloud, networks, IoT and mobile devices from cyberattack, but that doesn’t mean there were no technological advances made.SC Media reached out to several industry insiders to see which 2019 advances they thought deserved…
upward graph 700px
Security News

Cybersecurity trends in 2018

End of the year wrap-ups always want to name a year something, like the “Year of Ransomware” or the “Year of Artificial Intelligence,” but it would be difficult to pin 2018 to a specific threat or trend, as so many reared their ugly heads. With that noted, it is pretty simple to define the year…
Network Security, Security News

An AI solution to the cyber labor squeeze?

Can hype-scarred cybersecurity pros dare to be hopeful about artificial intelligence as a means to ease the acute information security labor shortage? The answer is a highly qualified “yes,” say several industry players usually skeptical of trendy cyber solutions but who are on the lookout for any tech that promises greater efficiency for labor-intensive grunt…
Security News

Land of the giants – Cybersecurity in 2018

2018 threw some cybersecurity curve balls but it also looked a lot like 2017…only bigger. Teri Robinson reports. Once upon a time, a Starwood breach exposed 500 million customers… $3.2 billion was lost to phishing attacks… 2.3 billion account credentials were compromised… A ransomware attack on the Sacramento Bee exposed the records of 19.5 million…
Features, Security News

Busted! 2019’s top cybercrime news

Spies, whistleblowers, students, executives and every variety of scammer. It seems no one was immune from the long arm of the law, or at least, the indictment, in 2019. Many are in custody, some have been sentenced and others remain at large.  Julian Assange  In what might have been the most anticipated arrest in 2019,…
Features, Security News

Compliance: Watch your step!

Avoiding the perilous pitfalls of compliance It’s no secret that Fortune 1000 CISOs struggle with compliance, but the pitfalls that fuel the most fury aren’t typically the ones with regulators (although regulator arguments do come in a close second). No, the battle is often internal, such as fighting over jurisdiction, with the California Consumer Privacy Act…
Privacy & Compliance News and Analysis, Security News

VPN Endgame

Choosing a virtual private network (VPN) can be difficult. Besides selecting a VPN provider, users must also choose between a paid VPN or a free VPN, among other factors. Simply picking a seemingly “free” VPN can have consequences ranging from having information logged and sold to advertisers, which may defeat the purpose of using a…
Next post in Privacy & Compliance News and Analysis