Re-Examining Identity & Access Management (IAM)

There is a lot security professionals disagree on when it comes to Identity & Access Management (IAM). One thing most would agree on though is that IAM means many things to many people, and has been shaped more by vendor product boundaries over the years than by overarching architectures, processes and governance. The basic term “Identity […]… Read More

The post Re-Examining Identity & Access Management (IAM) appeared first on The State of Security.

Continue reading Re-Examining Identity & Access Management (IAM)

Ransomware Rules for Payment: Do Extortionists Have the Advantage?

When an entire health system fell prey to cybercriminals and medical records were locked up by a ransomware attack in early February, there seemed no choice but to pay the sum demanded in order to avoid the impact on patient care: $17,000 in 40 Bitcoin.   And in that single moment, one hospital became the obligatory…

The post Ransomware Rules for Payment: Do Extortionists Have the Advantage? appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Ransomware Rules for Payment: Do Extortionists Have the Advantage?