You searched for identity management/ | SC Media

Your search for identity management/ returned 12 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Last 2 years remove
Cybersecurity remove

Your search for identity management/ returned 12 results

Sort Results:

Relevant Recent
Executive Insight, Opinion

A new way to think about security in autonomous systems: Don’t

The age of autonomy is upon us. While talk of autonomous cars in the not-too-distant future captures the imagination, the reality is that autonomous systems are very much with us in the present day. We see it in the robots that are packing parcels in an online retailer’s warehouse, or welding car parts on an…
FTC lodges new set of complaints against alleged cell phone spammers
Data Breach, Security News

Sprint customer data breached via Samsung website flaw

Threat actors gained unauthorized access to an undisclosed number of Sprint customer accounts via a compromised Samsung website.   “On June 22, Sprint was informed of unauthorized access to your Sprint account using your account credentials via the Samsung.com ‘add a line’ website,” the wireless provider said in a letter to impacted customers posted on Scribd. “The…
Security News

Undisclosed number of TurboTax accounts breached

Intuit, the company behind tax preparation software TurboTax, said users’ accounts may have been accessed by an unauthorized party. Threat actors used usernames and password combinations obtained from a non-Intuit source after an undisclosed number of TurboTax accounts were breached in a credential stuffing attack. Tax returns from the prior year, current tax returns in…
Security News

Wendy’s to pay $50M in data breach settlement

Wendy’s has agreed to pay $50 million to settle negligence claims following its 2015-2016 data breach that affected more than 1,000 of the burger chain’s locations. Payment card data was stolen from victims who purchased food at these locations then used fraudulently at other merchants after malware was installed through a third-party vendor. The settlement…
Plans include an open standard that would shrink users' dependency on passwords.
Government/Defense, Privacy & Compliance News and Analysis, Security News

Biometrics and AI firm team up for first U.S. biometric database amidst criticism

Biometrics firm SureID and AI-startup firm Robbie.AI are teaming up to launch the first U.S. biometric database. SureID has a nationwide network of fingerprint enrollment kiosks while Robbie.AI uses technology to authenticate using AI-based facial recognition and behavioral prediction that could be combined to create a nationwide biometric databased for consumer focused initiatives, according to…
Mars
Network Security, Security News

NASA takes Caltech’s JPL to task over cybersecurity issues

NASA’s Jet Propulsion Laboratory (JPL) is best known as the home for a variety of space-faring endeavors, but the facility is also tasked with defending the space agency from cyberattacks. A new report from NASA found that while JPL’s rocket scientists are doing well when it comes to handling space explorations, it found multiple security…
leakplumbing_863980
Security News

Dozens of high-profile Box accounts found leaking sensitive data

Adversis researchers have discovered that dozens of companies have leaked sensitive data as a result of misconfigured Box accounts. Box is a cloud based “content management platform” primarily used to share files and folders and similar to AWS S3 buckets. The files can be shared to anyone with the link, restricted to those within a…
Coronavirus

Coronavirus turns up the heat on cybersecurity projects

Cybersecurity projects – even important ones – often languish, due to budget constraints, scarce resources or simply because they’re just lower priority in the long list of things that need to be done. But for all the havoc it’s wreaked, the Covid-19 pandemic has pushed many of these initiatives to the forefront where they’re gaining…
Executive Insight, Security News

What cybersecurity can learn from bananas

Since the 1950s, the Cavendish banana has dominated the world market. Its thick skin makes it easy and stable to transport, and its flavor and seedlessness give it broad appeal. But the Cavendish banana’s lack of seeds is fast becoming its downfall. Without seeds, the Cavendish banana cannot reproduce naturally. It must be cloned. This…
Security News, Vulnerabilities

April Microsoft Patch Tuesday addresses two actively exploited zero-days

Microsoft April 2019 Patch Tuesday’s release included fixes for 74 vulnerabilities, 15 of which were classified as critical and most of which affect the Windows operating system itself and two actively exploited vulnerabilities. The actively exploited vulnerabilities included two Win32K Elevation of Privilege vulnerabilities on of which was discovered by the Alibaba Cloud Intelligence Security…
Next post in Vulnerabilities