3 Keys to Defending Active Directory

While perimeter defenses like firewalls and antivirus software remain essential elements of comprehensive network defense, stopping 100% of attacks at the perimeter is an impossibility with today’s ever-evolving attack surface. Eventually, an attacker… Continue reading 3 Keys to Defending Active Directory

Identity Management Day: Cybercriminals No Longer Hack in, They Log In

Identity Management Day is a way to educate about the importance of securing identity and access credentials When the police arrive at the scene of a break-in, one of the first things they’ll do is isolate the crime scene and assess its condition. The… Continue reading Identity Management Day: Cybercriminals No Longer Hack in, They Log In

Son of Stuxnet? Iran Nuke Site Hacked ‘by Israel’ (Again)

Iran’s Nantaz nuclear centrifuge facility went dark yesterday. Sources say it was an Israeli cyberattack—another one. But something doesn’t add up.
The post Son of Stuxnet? Iran Nuke Site Hacked ‘by Israel’ (Again) appeared first on Security Boulevard… Continue reading Son of Stuxnet? Iran Nuke Site Hacked ‘by Israel’ (Again)

Sonrai Security Deepens Security Ties With AWS

Sonrai Security announced today it has extended its ability to incorporate metadata captured from the public cloud operated by Amazon Web Services (AWS) into a platform that applies security policies based on identity. Brendan Hannigan, CEO, Sonrai Se… Continue reading Sonrai Security Deepens Security Ties With AWS

Taking a Security-First Approach to Cloud Migration

The pandemic and lockdowns hit their first anniversary mark, and many companies continue to have their employees work from home for the foreseeable future. Over the past year, organizations have seen how important cloud computing is to business operat… Continue reading Taking a Security-First Approach to Cloud Migration

Secure Offboarding Best Practices

The remote work conditions set up in response to the COVID-19 pandemic resulted in a host of new challenges for IT departments – one that’s often overlooked is securely offboarding employees. It’s an especially tricky task to locate … Continue reading Secure Offboarding Best Practices

Stop Password Reuse by Going Passwordless

There’s a t-shirt that reads, “My password is the last 20 digits of Pi.” It’s funny – who would ever guess that? – but every single password generator would flag that password as “weak.” There are no letters or symbols, and that would create a passwor… Continue reading Stop Password Reuse by Going Passwordless

Okta Acquisition of Auth0 Signals DevSecOps Shift Left

A pending $6.5 billion acquisition of Auth0 by Okta, announced this week, indicates the potential for a building wave of mergers and acquisitions driven by the rise of DevSecOps. As developers assume more responsibility for security, the influence the… Continue reading Okta Acquisition of Auth0 Signals DevSecOps Shift Left

2021 Cybersecurity Predictions

2020 has made cybersecurity among the priorities of most organizations. The challenging times brought by the COVID pandemic showed that no corporation is immune to cyber attacks. Even the largest and seemingly secure companies suffered vulnerabilities … Continue reading 2021 Cybersecurity Predictions