Marry IGA with ITSM to avoid the pitfalls of Identity 2.0

Identity 2.0 vendors are about to face a reckoning. For too long, they’ve focused solely on compliance and missed the mark on the adaptability, automation and integration that modern enterprises require. They’ve also emphasized provisioning at a time w… Continue reading Marry IGA with ITSM to avoid the pitfalls of Identity 2.0

Everyone’s talking about Data Privacy Day, but who’s listening?

It’s January 28th 2021, which means Data Privacy Day is upon us once again. A lot has happened in the past year, including a global pandemic that resulted in many of us becoming more dependent on our devices than ever before. For several years now, the… Continue reading Everyone’s talking about Data Privacy Day, but who’s listening?

International law enforcement effort pulls off Emotet botnet takedown

Law enforcement and judicial authorities worldwide have effected a global takedown of the Emotet botnet, Europol announced today. “The Emotet infrastructure essentially acted as a primary door opener for computer systems on a global scale. Once t… Continue reading International law enforcement effort pulls off Emotet botnet takedown

Apple fixes three actively exploited iOS zero-days

Apple has release a new batch of security updates and has fixed three iOS zero-days that “may have been actively exploited” by attackers. The three zero-days Two of the zero-day vulnerabilities (CVE-2021-1870 and CVE-2021-1871) are logic is… Continue reading Apple fixes three actively exploited iOS zero-days

Sudo vulnerability allows attackers to gain root privileges on Linux systems (CVE-2021-3156)

A vulnerability (CVE-2021-3156) in sudo, a powerful and near-ubiquitous open-source utility used on major Linux and Unix-like operating systems, could allow any unprivileged local user to gain root privileges on a vulnerable host (without authenticatio… Continue reading Sudo vulnerability allows attackers to gain root privileges on Linux systems (CVE-2021-3156)

Streamlining cloud compliance through automation

As companies migrate to the cloud to take advantage of its scalability and flexibility, many don’t fully realize how this move will affect their compliance with cybersecurity and privacy requirements mandated by laws and standards such as SOX, CC… Continue reading Streamlining cloud compliance through automation

Cybersecurity marketing: Always think of the customer

In early January, LogMeIn announced that Jamie Domenici will join the company as its new Chief Marketing Officer. Domenici is a cloud marketing veteran, and the majority of her career has been focused on ensuring businesses (especially small and medium… Continue reading Cybersecurity marketing: Always think of the customer

Business executives targeted with Office 365-themed phishing emails

An ongoing campaign powered by a phishing kit sold on underground forums is explicitly targeting high-ranking executives in a variety of sectors and countries with fake Office 365 password expiration notifications, Trend Micro researchers warn. The com… Continue reading Business executives targeted with Office 365-themed phishing emails

Security researchers targeted by North Korean hackers

Over the past few months, hackers have been trying to surreptitiously backdoor the computer systems of a number of security researchers working on vulnerability research and development at different companies and organizations, the Google Threat Analys… Continue reading Security researchers targeted by North Korean hackers