As vice president of Red Team Services at CyberArk, Shay Nahari has an up-close view of an enterprise's soft defenses. He sees adversaries attack workforce users and compromise credentials. The lines between identity and privilege are colliding. More than ever, Nahari says, context matters.
Cyberattacks don’t discriminate. In fact, 80% of organizations say they’re unprepared for a cyberattack.
Do you know how to close the security gaps that can lead to a data breach?
In this guide, you will learn:
How to become a security-first organization
How to take a holistic approach to online...
The latest edition of the ISMG Security Report features an analysis of whether businesses are stepping up their ransomware defenses in response to several warnings released by the U.S. and U.K. governments highlighting the threat posed to infrastructure. Also featured are the Thingiverse data breach and airline fraud...
How many ways do U.S. businesses need to be told to lock down their systems to safeguard themselves from ransomware? That's the focus of a new, joint cybersecurity advisory from the U.S. government pertaining to BlackMatter, following an advisory issued last month about Conti.
A data breach affecting MakerBot's Thingiverse 3D printing repository website is far bigger than what the company has acknowledged, a former employee claims. Upwards of 2 million users may have been affected by the breach, which left their 3D printers at risk of being hijacked.
After a turbulent 2020 dominated by dramatic change, cybersecurity experts everywhere are looking ahead at newly emerging and rapidly evolving threats and the ways in which IAM and IGA are adapting to stop them. But how much of what you’re hearing is hyperbole, and how much should you take to heart?
Join SecurID...
Criminal hackers don't break for lunches, weekends or holidays. Of course, that's just one of many challenges facing information security teams, as they attempt to maximize visibility and minimize complexity while protecting their business around the clock, says Peter Van Lierde, the CISO of energy firm Sibelga.
A Silicon Valley venture capital firm that runs a matchmaker service linking investors with startups exposed 6GB of data, including deal flow information pertaining to investors and startups. The exposure has been closed, but it's unclear if the company will notify regulators.
Apache, a popular open-source web server software for Unix and Windows, says it has fixed a zero-day vulnerability in its HTTP server that it says has been exploited in the wild. The path traversal and file disclosure vulnerability only affects Apache HTTP servers upgraded to version 2.4.49.
Privileged access management is cited as a major concern for enterprises moving workloads to Amazon Web Services (AWS) cloud environments. Managing identities with elevated permissions and cloud entitlements allows organizations to control risk by reducing their attack surface and mitigating the impact of privilege...
Four federal agencies have been awarded $311 million to bolster the U.S. government's cyber defenses and address IT modernization challenges, according to the interagency board of the Technology Modernization Fund, a federal funding source, which made the announcement Thursday.
In a bid to address security risks associated with the use of virtual private network solutions, the National Security Agency and the Cybersecurity and Infrastructure Security Agency on Tuesday offered government leaders guidance on selecting remote access VPNs and strengthening their security.
After a turbulent 2020 dominated by dramatic change, cybersecurity experts everywhere are looking ahead at newly emerging and rapidly evolving threats and the ways in which IAM and IGA are adapting to stop them. But how much of what you’re hearing is hyperbole, and how much should you take to heart?
Join SecurID...
Customer authentication is a critical component of almost every application that exists because it serves as a product gateway impacting 100% of customers. While it is a standard feature, it is not easy to get right and the stakes for getting it right are higher than ever: 46% of customers abandon a transaction...
CISA, the FBI and the U.S. Coast Guard Cyber Command warn users of Zoho Corp.'s single sign-on and password management tool to patch for a vulnerability that nation-state groups may look to exploit. Attackers could use the bug to compromise credentials and exfiltrate data from Active Directory.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.