The Digital Identity Trust Life Cycle: Onboarding and Deploying a Fraud Protection Vendor

Digital trust expert Rob Rendell explains what components are important for a smooth kickoff and how to prepare both your team and your new fraud protection vendor’s team.

The post The Digital Identity Trust Life Cycle: Onboarding and Deploying a Fraud Protection Vendor appeared first on Security Intelligence.

Continue reading The Digital Identity Trust Life Cycle: Onboarding and Deploying a Fraud Protection Vendor

Average data breach cost has risen to $3.92 million

The cost of a data breach has risen 12% over the past 5 years and now costs $3.92 million on average, according to IBM. These rising expenses are representative of the multiyear financial impact of breaches, increased regulation and the complex process… Continue reading Average data breach cost has risen to $3.92 million

Vulnerable TP-Link Wi-Fi extenders open to attack, patch now!

Several TP-Link Wi-Fi extender devices sport a critical remote code execution vulnerability that could allow attackers to take over the devices and command them with the same privileges of their legitimate user, IBM X-Force researcher Grzegorz Wypych w… Continue reading Vulnerable TP-Link Wi-Fi extenders open to attack, patch now!

High-risk behaviors expose most travelers to cyber risks

The travel industry and its customers are increasingly the targets of cyberattacks as criminals seek to monetize highly valuable travel data, according to the new IBM Security research. Compounding the problem, a new survey conducted by Morning Consult… Continue reading High-risk behaviors expose most travelers to cyber risks

KuppingerCole Report: Leadership Compass of Access Management and Federation

IBM Security Access Manager (ISAM) is rated as a leader in the Product, Marketing and Technology Leadership categories in KuppingerCole’s Leadership Compass report on access management and federation.

The post KuppingerCole Report: Leadership Compass of Access Management and Federation appeared first on Security Intelligence.

Continue reading KuppingerCole Report: Leadership Compass of Access Management and Federation

Preparing for the CCPA: Leverage GDPR Investments to Accelerate Readiness

To prepare for the CCPA and other upcoming data privacy regulations, start by applying the best practices and frameworks you used to achieve GDPR readiness when the regulation took effect last May.

The post Preparing for the CCPA: Leverage GDPR Investments to Accelerate Readiness appeared first on Security Intelligence.

Continue reading Preparing for the CCPA: Leverage GDPR Investments to Accelerate Readiness

Women in Security Speak Out at RSAC 2019, But There’s Still a Long Way to Go

At RSAC 2019, IBM Security General Manager Mary O’Brien noted that while the industry has made progress toward improving the experience of women in security, “a little better isn’t going to cut it.”

The post Women in Security Speak Out at RSAC 2019, But There’s Still a Long Way to Go appeared first on Security Intelligence.

Continue reading Women in Security Speak Out at RSAC 2019, But There’s Still a Long Way to Go

Blockchain: Making the Reward Much Greater Than the Risk

The decentralized nature of blockchain, coupled with consensus protocols, helps to address some security needs, but the consequences can be dire if security isn’t fully explored.

The post Blockchain: Making the Reward Much Greater Than the Risk appeared first on Security Intelligence.

Continue reading Blockchain: Making the Reward Much Greater Than the Risk

IBM interns find 19 vulnerabilities in corporate check-in systems

A pair of precocious interns at IBM’s red-teaming unit has found 19 previously undisclosed vulnerabilities in the automated systems that companies use to check visitors into their facilities. A hacker exploiting the security flaws could access visitor logs, contact information, and other company data, and use that access to go after corporate networks, the IBM X-Force Red researchers said. The study of five popular visitor-management systems is a warning of the risk of automating common societal tasks without security precautions. These systems are supplanting security guards as an efficient way of enabling access to a building, and apparent negligence in their architecture leaves them vulnerable. The interns, Hanna Robbins and Scott Brink, are students at the University of Tulsa and the Rochester Institute of Technology, respectively, according to their LinkedIn profiles. Robbins and Brink found default administrative login credentials that would give attackers complete control of a visitor-management application. They […]

The post IBM interns find 19 vulnerabilities in corporate check-in systems appeared first on CyberScoop.

Continue reading IBM interns find 19 vulnerabilities in corporate check-in systems

Stranger Danger: X-Force Red Finds 19 Vulnerabilities in Visitor Management Systems

Two X-Force Red interns discovered 19 previously undisclosed vulnerabilities across five popular visitor management systems that could enable attackers to establish a foothold on corporate networks.

The post Stranger Danger: X-Force Red Finds 19 Vulnerabilities in Visitor Management Systems appeared first on Security Intelligence.

Continue reading Stranger Danger: X-Force Red Finds 19 Vulnerabilities in Visitor Management Systems