You searched for identity management/ | SC Media

Your search for identity management/ returned 23 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Last 3 months remove

Your search for identity management/ returned 23 results

Sort Results:

Relevant Recent
WebCast

Building a Better Identity Management Roadmap

The way organizations operate and process information has drastically changed over the last six months as the global economic and health crisis has resulted in job losses, an expanded remote workforce, and increased use of temporary staff. One important byproduct of this shift: Security leaders are rethinking their approaches to access control. Even in the best of circumstances, ensuring effective oversight of digital identities is among a security leader’s most daunting responsibilities. Innovations in contextual and biometric authentication remain promising — though the latter must confront increased social and legal resistance — but the growing complexity of internal and external networks we rely on keeps the bar high.
Perspectives

Navigating through the mind of a 2020 hacker

When someone gets notified that they have been impacted by a data breach, many people picture a hooded figure in a dark basement with lines of code streaming across a computer screen. Contrary to popular belief, cyberattacks are rarely carried out by a sophisticated cyber-assassin looking to destroy a business. Most of the time they…
Data Breach, Privacy & Compliance News and Analysis, Security News

Revengeful hacker leaks database info after researcher threatens to reveal identities

A hacker going by the name of NightLion apparently breached the backend servers at data leak monitoring service DataViper and exfiltrated data, including more than 8,200 databases, as an act of revenge against a security researcher who plans to reveal the identity of Shiny Hunters, Gnostic Players, #TheDarkOverlord and other subgroups. DataViper, managed by Night…
Coronavirus, Data Breach, Government/Defense, Privacy & Compliance News and Analysis, Security News

Feds arrest teen Twitter hack leader, accomplices

The ringleader of the Twitter breach that used prominent accounts to run a cryptocurrency scam turns out to be a 17-year-old in Tampa arrested earlier today. Two accomplices, Nima Fazeli, 22, of Orlando and Mason Sheppard, 19, in the U.K., known as Rolex and Chaewon, respectively, were also arrested in the scheme that took over…
Coronavirus, Finance, Risk Management, Security News

Financial institutions likely to doubledown on security spending

Prior to the pandemic, financial institutions spent an average $2,700 on cybersecurity per full-time employee, up from $2,300 the previous year. COVID-19 now drives the need for companies to doubledown on cybersecurity going forward, according to a study from Deloitte’s cyber risk and strategic risk services group in conjunction with the Financial Services Information Sharing…
Data Breach, Government, Security News

All eyes on VA security measures after compromise of 46,000 accounts

The U.S. Department of Veterans Affairs (VA) disclosure that the information of 46,000 U.S. service people recently was breached through an apparent social engineering scheme underscores the need for government vigilance even when a significant investment has been made in state-of-the-art protection. Security experts said the relatively low number of impacted accounts – in comparison…
InfoSec World 2020, Security News

Alsid’s Melber urges active directory protection to fend off new attack patterns

Enterprises that start concentrating on protecting the active directory will be doing themselves a huge favor, Derek Melber emphasized in his Tuesday afternoon InfoSec World 2020 session, “New Attack Patterns: Targeting the Keys to the Kingdom.” “The attackers are going directly after the core IAM (Identity and Access Management) for nearly 95 percent of the…
Sponsor Content

Preparing for what’s next: Innovation also brings cybersecurity risk

Today’s CIOs have an unprecedented challenge on their hands. They are spearheading digital transformation efforts, creating revenue-generating applications, enabling remote work and driving seamless customer experiences. This new business environment also created a veritable playground for attackers, making it hard to strike the right balance between innovation and security. Most attacks today follow a similar…
Perspectives

Maximize zero trust security by expanding beyond basic principles

The pandemic has fundamentally changed how security teams think about protecting the business, in many cases accelerating digital transformation projects and placing renewed emphasis on the Zero Trust model for information security. As security teams implement Zero Trust, it’s important to consider access management and control. In doing so, this reflects a larger shift in…
Next post in Perspectives