You searched for identity management/ | SC Media

Your search for identity management/ returned 215 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Last 2 years remove
Home remove

Your search for identity management/ returned 215 results

Sort Results:

Relevant Recent
The threat of overprivileged accounts.
InfoSec Insider

The Threat Posed by Overprivileged Identities

Organizations have struggled to gain control over privileged identity management—a challenge that has tripped up many security and risk departments and has caused major cyber incidents. If the title of this article caught your eye, chances are you’re grappling with this issue and are looking for some insights that will make your life a little easier.

Product Review

Auth0

Auth0 is a cloud-based identity solution offering a universal authentication and authorization platform that protects the identities of all user types in any application. Traditional solutions with out-of-the-box features are secure but are often too rigid to accommodate the changing conditions and unique systems that application developers face. These developers create value through innovation, and…
Events, Security News

SC Media opens nominations for the 2020 SC Awards

SC Media is announcing a call for nominations for the 2020 SC Awards, which will be bestowed to the winners during a gala dinner celebration, to be held in February 2020 in San Francisco. The cybersecurity community is encouraged to submit nominations for its best and brightest companies, technologies and individuals in the following categories:…
VMware advisory warns users to patch critical issue in product
Network Security, Vulnerabilities

VMware begins patching process for Linux SACK vulnerabilities

VMware is instructing users to be on the lookout for software patches for 31 products that are affected by two vulnerabilities associated with the Linux kernel implementation of TCP Selective Acknowledgement (SACK). The two flaws, SACK Panic (CVE-2019-11477) and SACK Excess Resource Usage (CVE-2019-11478), were originally found and disclosed by Netflix researchers, along with two…
Cybercrime, Malware, Mobile Security, Phishing, Security News

Spyware disguised as Spanish banking apps removed from Google Play

A spyware program fraudulently disguised as a Spanish-language banking app was found last month collecting users’ device data and messages, which were later leveraged in smishing schemes. Advertised as “Movil Secure,” the fake app pretends to be associated with multinational Spanish banking group Banco Bilbao Vizcaya Argentaria (BBVA). Published on Oct. 19, the app was discovered by Trend…
Mobile/End Point Security, Privacy & Compliance News and Analysis, Security News

IoT bill would require gov’t use devices meeting cybersecurity standards

If passed, the Internet of Things Cybersecurity Improvement Act of 2019, introduced in the Senate and House Monday, would compel the U.S. government to purchase only devices that meet the legislation’s minimum security requirements “While I’m excited about their life-changing potential, I’m also concerned that many IoT devices are being sold without appropriate safeguards and protections in…
Reboot Leadership Awards 2019

Roger Grimes – KnowBe4

Why Nominated: Roger Grimes is a 30-year computer security professional and prolific author frequently consults with the world’s largest and smallest companies and militaries. Profile: In his role as an advocate, Roger Grimes spreads his message on the importance of cybersecurity to the community at conferences such as RSA, Black Hat, Tech Mentor, Tech Ed, SecTOR, AusCERT…
Cloud Security, Editorial, SC Security Ops Center, Security News

No ID? Get off my cloud

Cloud-based IAM puts authentication to the test Traditional brick-and-mortar organizations with on-premise servers are striving every day to keep pace with cloud-driven digital enterprises that are untethered by physical restraints, enabling employees to work from anywhere, accessing applications, services and mobile devices as regular parts of their flexible workdays. However, much like ducks on the…
Executive Insight, Opinion

A new way to think about security in autonomous systems: Don’t

The age of autonomy is upon us. While talk of autonomous cars in the not-too-distant future captures the imagination, the reality is that autonomous systems are very much with us in the present day. We see it in the robots that are packing parcels in an online retailer’s warehouse, or welding car parts on an…
Next post in Executive Insight