Software supply chain security (SCS) is rapidly gaining unwelcome notoriety as high-impact breaches hit the headlines. Third-party software suppliers SolarWinds, Apache (Log4j), and Kaseya have had far more than fifteen minutes of fame, alerting businesses and governments to the extent of structural weaknesses in the...
Ninety-four percent of recent survey respondents are concerned that TLS 1.3 will break their existing security controls. With the ever-expanding amount of encrypted network traffic mandated, it’s important to understand how to balance user and customer privacy with security controls. Join experts from Cisco Security...
The transition to PCI DSS v4.0 is a major inflection point for the payments industry – not only does it restructure how risk is assessed, but it also provides a better foundation for meeting ongoing technical innovation. While organizations with mature programs may need comparatively little uplift, all organizations...
Federal officials recently froze the assets of Ethereum blockchain cryptocurrency mixer Tornado Cash, stating that civil and potentially criminal penalties await those who use the service. On this week's "Sound Off," crypto expert Ari Redbord explains why the sanctions are "exceptional."
They’re necessary contributors to the business ecosystem, but there’s risk associated with third-party remote access, including bad actors lurking around every access point.
Domain name registrars track domain name owners via "whois" data, which is a crucial tool for investigators combating cybercrime. But Kroll's Alan Brill says that since the EU General Data Protection Regulation went into effect, many registrars no longer publicly share such information, and that's a problem.
For Cloud Service Providers (CSPs), FedRAMP authorization is the key to accessing the enormous Federal market, tapping into new revenue streams, and making cloud service offerings available for agency adoption and expansion. However, the associated high costs, extensive timelines, and operational burdens can often be...
Supply chain risk must be part of an enterprisewide risk management program framework, says information security manager Matt Marciniak of financial service firm Quantile. Reducing risk requires an agile approach to supplier management, he says.
For Cloud Service Providers (CSPs), FedRAMP authorization is the key to accessing the enormous Federal market, tapping into new revenue streams, and making cloud service offerings available for agency adoption and expansion. However, the associated high costs, extensive timelines, and operational burdens can often be...
Thales plans to enter the customer identity and access management market through its purchase of an emerging European CIAM player. The French firm plans to capitalize on OneWelcome's strong product by extending its footprint beyond Europe and into North America and Asia-Pacific.
Cybersecurity compliance is not the same as security. Recognizing this fact can lead many organizations to prioritize one over the other, thereby increasing critical risks. But by taking a planned approach to integrating the two, you can achieve a holistic solution that delivers both.
Grappling with the ever-increasing scale and complexity of your IT infrastructure?
You’re not alone. In fact, 75 percent of global technologists say they are faced with more IT complexity than ever before.
Like other IT leaders, you’re charged with managing more data, more providers, and more...
Historically, corporations have used digital forensic investigation tools for legal requests, discrimination and harassment investigations, IP theft investigations, compliance, M&A and other HR investigations. However, despite what is reported in the news about cyber incidents and cyberattacks, many are perpetrated by...
With our award winning, patented technology and proven expertise, CyberArk is the only company that can provide full protection from advanced and insider threats to mitigate your risks and meet high stakes compliance requirements. CyberArk has more deployments in large-scale distributed and virtual environments,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.