What is Identity Governance and Administration (IGA)?

Utilizing an identity and access management solution (IAM) with identity governance and administration (IGA) capabilities is necessary for security and compliance in your modern IT environment.
The post What is Identity Governance and Administration (I… Continue reading What is Identity Governance and Administration (IGA)?

SHOCKER: Senate Says Security Sucks—Still

A Senate committee graded cybersecurity as poor among eight big agency departments. Not much has changed since the last report.
The post SHOCKER: Senate Says Security Sucks—Still appeared first on Security Boulevard.
Continue reading SHOCKER: Senate Says Security Sucks—Still

Bitglass Security Spotlight: Ransomware Developments, Additional SolarWinds Victims, and More Data Breaches

Here are the top security stories from recent weeks: 

Kaseya Obtains Master Decryption Key for REvil Ransomware
DarkSide Ransomware Gang Rebrands as BlackMatter
DOJ Says Email Accounts of 27 U.S. Attorneys’ Offices Were Breached During SolarWinds Ha… Continue reading Bitglass Security Spotlight: Ransomware Developments, Additional SolarWinds Victims, and More Data Breaches

Health Care Security Must Mature With 5G

It’s clear that 5G technology is rapidly coming of age, and is enjoying wide adoption across every industry. According to Gartner, the market for 5G infrastructure was predicted to hit $4.2 billion over the past year, with two-thirds of companies depl… Continue reading Health Care Security Must Mature With 5G

Partners in Crime: How Ransomware Gangs Are Working Together

By now, it’s clear that paying the ransom won’t necessarily help ransomware victims to recover their data. Paying up also doesn’t guarantee that victims will be safe from secondary attacks. According to our ransomware report, 80% of organizations… Continue reading Partners in Crime: How Ransomware Gangs Are Working Together

4 Questions that are Top of Mind for Chief Audit Officers in 2021

With the pandemic still a present factor in our personal and professional lives, it has shifted the way we work and the way businesses operate—and most of the changes we’ve made to adapt to the situation are likely here to stay. Having made such a sudd… Continue reading 4 Questions that are Top of Mind for Chief Audit Officers in 2021

Italian Vaccine Sites Shut Down by Ransomware Thugs

Some Italian healthcare websites and their backroom systems have been wiped off the internet by malware.
The post Italian Vaccine Sites Shut Down by Ransomware Thugs appeared first on Security Boulevard.
Continue reading Italian Vaccine Sites Shut Down by Ransomware Thugs

Data Laundering Poses Privacy, Security Risks

Data laundering, like money laundering, is the act of acquiring data through an illegal means—whether that’s the dark web or a hacked/stolen database—and then taking that data and running it through a legitimate business or process in order to make th… Continue reading Data Laundering Poses Privacy, Security Risks

Estonian Hacker Steals 300,000 Government ID Photos

Estonia’s electronic ID system was hacked last week. Again. A suspect is in custody.
The post Estonian Hacker Steals 300,000 Government ID Photos appeared first on Security Boulevard.
Continue reading Estonian Hacker Steals 300,000 Government ID Photos

Google Workspace vs. G Suite: Demystifying Google Workspace

Google Workspace is an evolved version of G Suite designed for seamless integration between Google applications. Here’s everything to know.
The post Google Workspace vs. G Suite: Demystifying Google Workspace appeared first on Security Boulevard.
Continue reading Google Workspace vs. G Suite: Demystifying Google Workspace