How to measure the success of identity security initiatives

How to measure the success of identity security initiatives

Over the years, identity management has escalated from a mere productivity nuisance to now representing a significant security risk. In fact, the Verizon 2024 Data Breach Investigations Report reveals stolen credentials have played a role in almost one-third of all breaches in the last decade. Because identity management was historically viewed as an IT issue, most programs focused on the ease and speed of granting access. This strategy led to a huge wave of unnecessary…

Read More

Summer travel plans? Don’t get scammed while you’re away

Summer travel plans? Don’t get scammed while you’re away

Your itinerary is set.  Your luggage is packed.  You’ve even scheduled the Uber pickup for the morning trip to the airport. It seems as if nothing now stands in the way between you and clicking that glorious out-of-office button. However, if you work in IT or security, your pre-summer vacation checklist must go beyond the items you’ll pack inside a suitcase. How will you maintain the organization’s cyber security posture when you’re away from the…

Read More

Security leaders weigh in on Life360 data breach

Security leaders weigh in on Life360 data breach

Life360 was impacted by a data breach, which they announced in early June. The malicious actors behind the data breach have appeared to target systems associated with Tile, a Life360 subsidiary. Possibly compromised information may include client names, phone numbers, addresses, email addresses and identification numbers for tile devices.  Security leaders weigh in  Piyush Pandey, CEO at Pathlock: “In this instance, it appears that access was given using the admin credentials of a former Tile…

Read More

How to Prevent Phishing Attacks with Multi-Factor Authentication

How to Prevent Phishing Attacks with Multi-Factor Authentication

Phishing takes advantage of the weakest link in any organization’s cybersecurity system—-human behavior. Phishing attacks are generally launched via email, although some opening salvos have begun using text messaging or phone calls. In the most common scenario, an email arrives purporting to be from HR or IT, for example. It looks just like any other company email. It advises the viewer to update their personal information or IT profile by clicking on a link or…

Read More

Going back to the basics this Cybersecurity Awareness Month

Going back to the basics this Cybersecurity Awareness Month

Going back to the basics this Cybersecurity Awareness Month | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Authenticating like the transportation security administration

Authenticating like the transportation security administration

Authenticating like the transportation security administration | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Report: 15% of law firms feel they have security gaps

Report: 15% of law firms feel they have security gaps

Report: 15% of law firms feel they have security gaps | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Securing healthcare data in the era of AI

Securing healthcare data in the era of AI

Securing healthcare data in the era of AI | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

What security leaders can learn from Smashing Pumpkins hacker attack

What security leaders can learn from Smashing Pumpkins hacker attack

What security leaders can learn from Smashing Pumpkins hacker attack | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

How organizations can protect against phishing campaigns

How organizations can protect against phishing campaigns

How organizations can protect against phishing campaigns | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More
1 2 3 5