You searched for identity management/ | SC Media

Your search for identity management/ returned 164 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Last 2 years remove
Security News remove

Your search for identity management/ returned 164 results

Sort Results:

Relevant Recent
The threat of overprivileged accounts.
InfoSec Insider

The Threat Posed by Overprivileged Identities

Organizations have struggled to gain control over privileged identity management—a challenge that has tripped up many security and risk departments and has caused major cyber incidents. If the title of this article caught your eye, chances are you’re grappling with this issue and are looking for some insights that will make your life a little easier.

Events, Security News

SC Media opens nominations for the 2020 SC Awards

SC Media is announcing a call for nominations for the 2020 SC Awards, which will be bestowed to the winners during a gala dinner celebration, to be held in February 2020 in San Francisco. The cybersecurity community is encouraged to submit nominations for its best and brightest companies, technologies and individuals in the following categories:…
VMware advisory warns users to patch critical issue in product
Network Security, Vulnerabilities

VMware begins patching process for Linux SACK vulnerabilities

VMware is instructing users to be on the lookout for software patches for 31 products that are affected by two vulnerabilities associated with the Linux kernel implementation of TCP Selective Acknowledgement (SACK). The two flaws, SACK Panic (CVE-2019-11477) and SACK Excess Resource Usage (CVE-2019-11478), were originally found and disclosed by Netflix researchers, along with two…
Cybercrime, Malware, Mobile Security, Phishing, Security News

Spyware disguised as Spanish banking apps removed from Google Play

A spyware program fraudulently disguised as a Spanish-language banking app was found last month collecting users’ device data and messages, which were later leveraged in smishing schemes. Advertised as “Movil Secure,” the fake app pretends to be associated with multinational Spanish banking group Banco Bilbao Vizcaya Argentaria (BBVA). Published on Oct. 19, the app was discovered by Trend…
Mobile/End Point Security, Privacy & Compliance News and Analysis, Security News

IoT bill would require gov’t use devices meeting cybersecurity standards

If passed, the Internet of Things Cybersecurity Improvement Act of 2019, introduced in the Senate and House Monday, would compel the U.S. government to purchase only devices that meet the legislation’s minimum security requirements “While I’m excited about their life-changing potential, I’m also concerned that many IoT devices are being sold without appropriate safeguards and protections in…
Cloud Security, Editorial, SC Security Ops Center, Security News

No ID? Get off my cloud

Cloud-based IAM puts authentication to the test Traditional brick-and-mortar organizations with on-premise servers are striving every day to keep pace with cloud-driven digital enterprises that are untethered by physical restraints, enabling employees to work from anywhere, accessing applications, services and mobile devices as regular parts of their flexible workdays. However, much like ducks on the…
About Reviews, Group Tests, Product News, Reviews, Security News

SC Product Reviews: Identity & Access Management

This month, SC Labs assessed several identity and access management solutions. This review comes at a relevant time with the recent events surrounding COVID-19 and the global shift to working from home. The traditional, known perimeter has grown increasingly immaterial over the years. The unprecedented, world-wide scramble to work remotely has emphasized that the previously…
The state of passwords in 2019.
InfoSec Insider

The State of Passwords in 2019: Will They Ever Go Away?

Password security has undergone a significant transformation over the last few years. As a reaction to the insecure form of identity verification that is logging in with a password, technologies such as two-factor authentication (2FA), multi-factor authentication (MFA), and hardware keys. This begs the question—where does that leave passwords in 2019?

Executive Insight, Opinions, Security News

Using Social Auth with Your App? 4 Steps to Protect Your Users and Mitigate Security Concerns

By Keith Casey, Okta API Problem Solver Another day, another breach headline. What’s unique about the latest Facebook breach is that it’s the source of truth for many other companies and applications who use social platforms for authentication. A vulnerability in a social authentication service has far-reaching effects across thousands of apps and millions of users.…
JoomlaPassword
Data Breach, Security News

Password manager flaws can expose data on compromised devices, report says

Flaws in top password managers can expose the very data they are supposed to protect, a study by researchers at Independent Security Evaluators (ISE) researchers found. “100 percent of the products that ISE analyzed failed to provide the security to safeguard a user’s passwords as advertised,” ISE CEO Stephen Bono said in a release announcing…
Next post in Security News