The security industry has been too focused on managing identities - and not focused enough on privileged access, says Andy Vallila of Dell Security Solutions. In this video interview, he discusses the level of visibility organizations need for privileged accounts.
The keys to the digital kingdom are too easy to steal through malware and social engineering. What can security leaders do to help raise their organizations' level of privileged access management? Ken Ammon of CA Technologies offers insights in this video interview.
Identity management is going to be a big issue in 2016, and emerging authentication tools, such as biometrics, could very well gain a more significant foothold, although not without posing new risks, says Steve Martino, CISO at Cisco Systems.
Just back from a trip to Israel, where she spoke with leading security researchers about such topics as the Internet of Things, cyberterrorism and banking malware, Gartner analyst Avivah Litan says 2016 will be a turning point for adoption of biometrics in identity proofing. Learn why in this video interview.
Application proliferation has created identity fragmentation as user identities are inconsistently managed across applications in the enterprise, increasing risk and cost. Enterprises need to ensure users have sufficient access privileges to perform their job functions, but for compliance and security reasons it's...
Welcome to the digital economy, where whole industries are being fundamentally reshaped as organisations scramble to build new business models, tap new markets and create new sources of competitive advantage. The dynamics of digitisation that first emerged in industries such as music and video can now be seen...
Several recent health data security incidents - including two at a Florida hospital and another at a Washington state Medicaid agency - illustrate the challenges healthcare organizations face in detecting and preventing insider breaches.
President Obama is creating a federal CISO post as part of a multifaceted initiative aimed at strengthening the nation's IT security. His plan includes forming a public-private Commission on Enhancing National Cybersecurity and boosting government cybersecurity spending by 35 percent.
IT security and access management have never been greater challenges.
While the criminals get smarter, the IT environments become more complex to manage. Most are a hybrid of on-premise systems and a multitude of cloud providers transforming the act of role-based access management into a manual nightmare. To...
Privileged credentials have served as a major attack
vector in the successful execution of many breaches.
Protecting privileged access is an imperative to
successfully defend an organization from a breach and
is a core requirement of multiple compliance regimes.
Download this whitepaper to explore how to defend...
A new layer of security in organizations, focused specifically on the protection and management
of identities, is a critical new requirement in efforts to stem the tide of breaches. Of these identities, none are so
critical as those belonging to privileged users.
Malicious users predictably follow a logical...
Virtualization and cloud computing adoption are elevating the importance and complexity of an age-old problem: effectively managing and protecting passwords for privileged accounts. Managing and protecting privileged credentials is
essential to reducing risk and addressing compliance
requirements. Organizations need...
Organizations handling transactions involving credit or debit cards are facing increasing pressure to comply with the Payment Card Industry Data
Security Standard (PCI DSS) version 3, which established
various requirements for safeguarding an organization's relevant systems and networks, comprising the
Cardholder...
To not only survive in the application economy, businesses are undergoing a digital transformation in which they
add digital components to all of their products and services. This
means having to develop for and integrate with a variety of APIs,
microservices, cloud applications and infrastructures-...
Files may be secure within a network using perimeter-based solutions. They may even remain secure during transit using encryption technologies. But what happens once recipients obtain and decrypt those files? How do you keep information secure as the file gets passed around or downloaded onto a flash drive? How can...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.