Understaffing persistently impacting enterprise privacy teams

A research from ISACA explores the latest trends in enterprise privacy — from privacy workforce and privacy by design to privacy challenges and the future of privacy. The report highlights the persistent understaffing that is impacting enterprise priva… Continue reading Understaffing persistently impacting enterprise privacy teams

Reducing the blast radius of credential theft

Cybersecurity has come to be defined by identity, with almost every attack today revolving around gaining control of a user’s identity as a means of accessing critical data and systems. Verizon’s latest data breach report found that credentials are the… Continue reading Reducing the blast radius of credential theft

65% of organizations continue to rely on shared logins

As organizations look to embrace modern approaches to security in 2022, a strongDM survey has revealed that access management is one of the most crucial factors to achieving this goal. The data showed that 80% of organizations are looking to address ac… Continue reading 65% of organizations continue to rely on shared logins

The importance of securing machine-to-machine and human-to-machine interaction

In this interview with Help Net Security, Oded Hareven, CEO at Akeyless, explains how organizations manage secrets, particularly how this practice has changed and evolved amid the rapid shift to hybrid/remote work and how it benefits organizations secu… Continue reading The importance of securing machine-to-machine and human-to-machine interaction

When protecting and managing digital identities, orchestration and automation are critical

In this interview with Help Net Security, David Mahdi, CSO of Sectigo, talks about the importance of digital identity management, the issues organizations have with digital identities and what they can do to overcome them. The rapid shift to hybrid wor… Continue reading When protecting and managing digital identities, orchestration and automation are critical

Consumer IAM market to reach $17.6 billion by 2026

The global consumer IAM market is projected to grow from $8.6 billion in 2021 to $17.6 billion by 2026, at a Compound Annual Growth Rate (CAGR) of 15.3% during the forecast period, according to ResearchAndMarkets. The major driving factors contributing… Continue reading Consumer IAM market to reach $17.6 billion by 2026

Starting From Scratch: How to Build a Small Business Cybersecurity Program

When you run a small business, outsourcing for services like IT and security makes a lot of sense. While you might not have the budget for a full-time professional on staff to do these jobs, you still need the services. However, while it might be helpful to have a managed service provider handle your software […]

The post Starting From Scratch: How to Build a Small Business Cybersecurity Program appeared first on Security Intelligence.

Continue reading Starting From Scratch: How to Build a Small Business Cybersecurity Program

Unused identities: A growing security threat

In early May 2021, Colonial Pipeline, the operator of the pipeline that pumps 45% of the East Coast’s fuel, announced that they had been hacked. In his testimony before the Senate Committee on Homeland Security and Governmental Affairs, the company’s p… Continue reading Unused identities: A growing security threat

IAM OT Security Risks Call for Strategic Defenses

Today’s technology requires today’s identity and access management (IAM). In the past, operational technology (OT) systems were physically and logically separated from a company’s enterprise corporate business environment and the external world. That served as a control to protect them from common cyberattacks. Starting in the 1970s, serial-based analog processes controlled, managed and monitored these […]

The post IAM OT Security Risks Call for Strategic Defenses appeared first on Security Intelligence.

Continue reading IAM OT Security Risks Call for Strategic Defenses

7 Holiday Cybersecurity Tips to Try Before The Year Ends

The holiday rush is upon us, and so is the risk of cyberattack. Threat actors often get to work during the holidays. IT staff is heading out for vacation, and everyone is in a hurry. This means we might skimp on security. Still, there are some holiday cybersecurity tips that will help make the season […]

The post 7 Holiday Cybersecurity Tips to Try Before The Year Ends appeared first on Security Intelligence.

Continue reading 7 Holiday Cybersecurity Tips to Try Before The Year Ends