The critical role of authorization in safeguarding financial institutions

According to a recent Cost of Data Breach report, the financial industry has the second highest average cost for a data breach, making the value well worth financial institutions investing more into authorization. In this Help Net Security video, David… Continue reading The critical role of authorization in safeguarding financial institutions

3 ways to strike the right balance with generative AI

To find the sweet spot where innovation doesn’t mean sacrificing your security posture, organizations should consider the following three best practices when leveraging AI. Implement role-based access control In the context of generative AI, having pro… Continue reading 3 ways to strike the right balance with generative AI

The power of passive OS fingerprinting for accurate IoT device identification

The number of IoT devices in enterprise networks and across the internet is projected to reach 29 billion by the year 2030. This exponential growth has inadvertently increased the attack surface. Each interconnected device can potentially create new av… Continue reading The power of passive OS fingerprinting for accurate IoT device identification

Adapting authentication to a cloud-centric landscape

In this Help Net Security interview, Florian Forster, CEO at Zitadel, discusses the challenges CISOs face in managing authentication across increasingly distributed and remote workforces, the negative consequences of ineffective authorization, and how … Continue reading Adapting authentication to a cloud-centric landscape

Google Workspace: New account security, DLP capabilities announced

New capabilities in Google Workspace will help enterprises improve account and data security, by making unauthorized takeover of admin and user accounts and exfiltration of sensitive data more difficult. Some of these options are already available in p… Continue reading Google Workspace: New account security, DLP capabilities announced

Data privacy vault: Securing sensitive data while navigating regulatory demands

In this Help Net Security interview, Jean-Charles Chemin, CEO of Legapass, provides insight into the correlation between maintaining customer trust and protecting sensitive customer data. He emphasizes how a data privacy vault can reinforce customer tr… Continue reading Data privacy vault: Securing sensitive data while navigating regulatory demands

Is there a problem to store user permissions in the database instead of in a external auth service?

In AWS Cognito we could define a role/permissions as a custom attribute in the user pool, but we could have a User table and a caching database and fetch roles each time the user does a request.
Of course, the first approach avoids an unne… Continue reading Is there a problem to store user permissions in the database instead of in a external auth service?