Episode 5: Putting Your CIAM Model to Work on a Continuous Basis

Episode 5: Putting Your CIAM Model to Work on a Continuous Basis

In this fifth and final episode of our 5-episode podcast, The C-level Strategic Guide for CIAM Investment, we will explore phase 4 on the CIAM Maturity Curve: Continuous.  Customer identity and access management, or CIAM, is fundamentally about “making sure the right people have access to the right things for the right amount of time,” says Keith Casey, API Problem Solver at Okta. For companies in this fourth and final phase of the Maturity Curve,…

Read More

DoJ Seizes Millions in Ransom Paid by Colonial Pipeline to Darkside Hackers

DoJ Seizes Millions in Ransom Paid by Colonial Pipeline to Darkside Hackers

The US authorities have scored a rare win in the fight against ransomware after claiming to have seized the majority of the funds paid to Russian ransomware hackers by Colonial Pipeline. The Department of Justice (DoJ) announced on Monday that it had been able to track and access 63.7 out of the 75 Bitcoins paid by the East Coast fuel transportation company to the DarkSide gang. That amounts to roughly $2.3 million of the $4.4 million…

Read More

“IT burden” and cybersecurity “trade-offs” take center stage in a new digital collaboration survey

“IT burden” and cybersecurity “trade-offs” take center stage in a new digital collaboration survey

Over the last year, companies around the world have adopted remote work policies, presenting organizations and IT teams with no shortage of challenges. Image: GettyImages/Laurence Dutton Over the last year, organizations around the globe adopted remote work policies to mitigate the spread of COVID-19. During this time, remote teams used a vast suite of tools a la video conferencing platforms and messaging services to enable virtual collaboration. On Tuesday, software company AvePoint released the results…

Read More

Registration is open for webinar on increasing your organization’s operational resilience

Registration is open for webinar on increasing your organization’s operational resilience

Registration is open for webinar on increasing your organization’s operational resilience | 2021-06-08 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

Advanced technology applications drive new opportunities for video management systems

Advanced technology applications drive new opportunities for video management systems

Advanced technology applications drive new opportunities for video management systems | 2021-06-08 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Weighing the value of professionally installed & monitored security

Weighing the value of professionally installed & monitored security

Weighing the value of professionally installed & monitored security | 2021-06-08 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Proofpoint Launches Industry’s First Cloud Native Information Protection and Cloud Security Platform | Proofpoint US

Proofpoint Launches Industry’s First Cloud Native Information Protection  and Cloud Security Platform | Proofpoint US

Cybersecurity leader also introduces multiple people-centric advancements spanning its Threat Protection and Compliance Platforms, including Advanced BEC Defense, powered by the new Supernova detection platform SUNNYVALE, Calif., June 8, 2021 – Proofpoint, Inc. (NASDAQ: PFPT), a leading cybersecurity and compliance company, today announced several people-centric innovations across its three flagship platforms: Threat Protection, Compliance, and the new Information Protection and Cloud Security. Available today, Proofpoint’s Information Protection and Cloud Security Platform is the market’s first cloud…

Read More

The ClubCISO 2021 Information Security Maturity Report

The ClubCISO 2021 Information Security Maturity Report

We all have heard and read how the pandemic has disrupted our lives, how it has accelerated digital transformation to an unprecedented extent and how it challenged the existing security policies and practices. The question is how the people responsible for fortifying their organizations experienced the whole situation. Letter from the frontline The ClubCISO community has surveyed its members to understand how CISOs and organizations in general reacted to this crisis. If there is a…

Read More

The Principal of ‘Least Privilege’ in the World of Cybersecurity

The Principal of ‘Least Privilege’ in the World of Cybersecurity

The principle of least privilege in cybersecurity prescribes that no user should have access to system resources beyond what’s necessary for fulfilling a specific task. Adhering to this principle has become essential, as one of the primary ways malicious actors breach a system is by compromising (legitimate) user access. The 2020 Global State of Least Privilege Report shows that two-thirds of organizations now consider the implementation of least privilege a top priority in achieving a…

Read More

The Principle of ‘Least Privilege’ in the World of Cybersecurity

The Principal of ‘Least Privilege’ in the World of Cybersecurity

The principle of least privilege in cybersecurity prescribes that no user should have access to system resources beyond what’s necessary for fulfilling a specific task. Adhering to this principle has become essential, as one of the primary ways malicious actors breach a system is by compromising (legitimate) user access. The 2020 Global State of Least Privilege Report shows that two-thirds of organizations now consider the implementation of least privilege a top priority in achieving a…

Read More
1 2,238 2,239 2,240 2,241 2,242 2,581