An unidentified hacking group is deploying a rootkit dubbed Netfilter, which is signed in as a legitimate Microsoft driver but used to affect gaming outcomes, researchers at German security firm G Data CyberDefense say.
As identity related attacks have increased in recent years, organizations are continuously evaluating how to optimize the security policies in their environment.
In this whitepaper, we cover Okta ThreatInsight, a baseline security feature of the Okta Identity Cloud which helps organizations secure their organization...
As you adopt cloud IaaS to meet business goals, effective security controls can’t be an afterthought. This elastic server environment requires smart access controls; but how do you adhere to your security policies without limiting automation?
Read the five key takeaways from a webinar featuring Dr. Chase...
The range of digital identities has evolved into four distinct categories. What role can automation play in managing them? Jason Soroko of Sectigo addresses these and other trends, including the future of passwordless authentication, during an interview with Information Security Media Group as part of ISMG’s RSA...
The Identity Theft Resource Center, a nationally recognized nonprofit organization established to support victims of identity crime, has published new research that shows nearly 30% of people who contact the ITRC are victims of more than one identity crime.
The explosion of mobile and cloud technologies has dissolved the traditional perimeter. Whether you’re handling transactional or personal data, it’s critical that it is gathered ethically, managed with integrity, and properly safeguarded. When people are the perimeter, identity becomes the foundation of a Zero...
Remote work is changing the landscape of how businesses get work done as they move from an in-office work culture to a work-from-anywhere one. The COVID-19 pandemic has only accelerated this change. Is your business prepared to enable employees to securely collaborate while being physically apart?
View this...
Organizations in all sectors need to build a continuous monitoring and response mechanism to defend against ransomware attacks, according to a panel of security experts from the Middle East
Troels Oerting, a veteran CISO who most recently served the World Economic Forum, has a storied career. He's been there, done that and mitigated the risk. In this exclusive conversation, he shares his opinions on today's threats, emerging technologies and challenges for the next generation of security leaders.
In the past six months alone, we've seen the SolarWinds attack, the Microsoft Exchange Server exploits and the Colonial Pipeline ransomware strike. The threats are more imminent than ever. But Philip Reitinger of the Global Cyber Alliance believes strongly: We created this mess, and we can fix it.
As a retired Air Force general and the former federal CISO of the United States, Gregory Touhill is well-versed in critical infrastructure protection and resiliency. Now, as the new director of CMU SEI's CERT division, he has the opportunity to help foster new levels of education and collaboration.
How are governments using secure digital identity verification to improve the lives of citizens globally? Find out how the UK Home Office, U.S. Department of Homeland Security, Singapore Government, Australian Government, UK National Health Service (NHS) and Estonian Smart-ID are using online biometric authentication...
The latest edition of the ISMG Security Report features an analysis of why transparent communication in the aftermath of a data breach pays off. Also featured: Mastercard on digital identity issues; building a more diverse and inclusive cybersecurity workforce.
Data security is a never-ending challenge. On one hand, IT organizations are
required to keep up with regulations and protect intellectual property from
targeted attacks and accidental exposure. On the other, they must adapt to
macro IT movements, such as the adoption of cloud applications, hybrid...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.