Cisco: Booming identity market driven by leadership awareness

A new study by Cisco Investments with venture capital firms finds that most CISOs find complexity of tools, number of solutions and users, and even jargon a barrier to zero trust. Continue reading Cisco: Booming identity market driven by leadership awareness

Avoidable digital certificate issues fuel data breaches

Among organizations that have suffered data breaches 58% were caused by issues related to digital certificates, according to a report by AppViewX and Forrester Consulting. As a result of service outages, 57% said their organizations have incurred costs… Continue reading Avoidable digital certificate issues fuel data breaches

Using fingerprints everywhere to identify at physical, ID required, places

I was wondering why people can’t just use fingerprints to retrieve all necessary documents where required.
What would be the problem with such form of authentication, which could be used via fingerprint readers with screens, at all point w… Continue reading Using fingerprints everywhere to identify at physical, ID required, places

Lessons learned from the Microsoft Cloud breach

In early July, the news broke that threat actors in China used a Microsoft security flaw to execute highly targeted and sophisticated espionage against dozens of entities. Victims included the U.S. Commerce Secretary, several U.S. State Department officials and other organizations not yet publicly named. Officials and researchers alike are concerned that Microsoft products were […]

The post Lessons learned from the Microsoft Cloud breach appeared first on Security Intelligence.

Continue reading Lessons learned from the Microsoft Cloud breach

Artificial intelligence threats in identity management

The 2023 Identity Security Threat Landscape Report from CyberArk identified some valuable insights. 2,300 security professionals surveyed responded with some sobering figures: 68% are concerned about insider threats from employee layoffs and churn 99% expect some type of identity compromise driven by financial cutbacks, geopolitical factors, cloud applications and hybrid work environments 74% are concerned […]

The post Artificial intelligence threats in identity management appeared first on Security Intelligence.

Continue reading Artificial intelligence threats in identity management

CISOs consider zero trust a hot security ticket

The majority of organizations are on the road to implementing a zero trust framework to increase their overall security risk posture, according to PlainID. However, only 50% said that authorization makes up their zero trust program – potentially … Continue reading CISOs consider zero trust a hot security ticket

Exploring the macro shifts in enterprise security

The number of successful ransomware attacks and data breach attempts fell by 30% over the last year, the number of reported security incident types at organizations increased, according to the 2023 Cybersecurity Perspectives Survey by Scale. Security i… Continue reading Exploring the macro shifts in enterprise security

CISOs under pressure: Protecting sensitive information in the age of high employee turnover

In this Help Net Security interview, Charles Brooks, Adjunct Professor at Georgetown University’s Applied Intelligence Program and graduate Cybersecurity Programs, talks about how zero trust principles, identity access management, and managed sec… Continue reading CISOs under pressure: Protecting sensitive information in the age of high employee turnover

Implementing Access Controls using Microsoft Intune

Implementing identity and access management processes is an effective way to protect sensitive corporate data. It allows organizations to regulate user access and prevent instances of identity theft, data breaches, and unauthorized access to confidential corporate information. In this article, we’ll detail how organizations can significantly minimize their exposure by controlling access privileges with Microsoft…

The post Implementing Access Controls using Microsoft Intune appeared first on Petri IT Knowledgebase.

Continue reading Implementing Access Controls using Microsoft Intune