An Australian company that issues identity cards for access to airports has been notifying applicants and cardholders that their personal information may have been compromised, according to a news report. Australian federal police are investigating.
An ongoing security operations center challenge is trying to get the right data to the right person at the right time. The problem is compounded by there being "too much data and not finding the right people to deal with the data," says Mischa Peters of IntSights. What can help?
To mitigate the insider threat, organizations should apply user behavior analytics powered by artificial intelligence, says Mark Bower of Egress Software Technologies.
To better counter threats carried by content - email, attachments, files - Deep Secure's Simon Wiseman says organizations should investigate content threat removal, which involves extracting required data from content and discarding the rest.
Behavioral analytics have taken the fast lane from emerging tech to mature practice.
The key element that has made behavioral analytics move so fast and become something so important to security is that the focus has been not on the technology itself but on the value it provides the enterprise, notably when being...
Attackers have stolen $23.5 million in cryptocurrency from Bancor, which is developing a decentralized exchange. The cause of the hack may have been a failure by Bancor to protect authentication keys that allowed for changes in its token smart contracts.
Every application should be protected the same way no matter where it resides, rather than focusing on a "perimeter" approach, says Doug Copley of Duo Security, who describes a "zero trust" approach.
Every day, as employees routinely use applications and share data, they leave behind an invisible "access footprint" - credentials and connections to other systems. These are the basic tools - keys - that advanced
attackers use once inside your network to move from their initial point of entry to their targets. The...
When should a technology or security leader get involved in M&A? The short answer: as early as possible. Security
really should play a prominent role before, during, and after the acquisition activity.
Download this eBook to learn more about:
High-profile incidents of cyber disruption during M&A;
How security...
Information technology and its use cases are constantly evolving. The challenge is undertaking security as intelligently as possible, using data-driven, risk-informed strategic occasions to apply resources efficiently and effectively.
The IT modernization effort taking root within the U.S Federal Government presents...
Adaptive authentication is a new approach to combatting fraud that achieves the twin goals of reducing fraud risk and preserving the customer experience.
Download this white paper and learn:
The characteristics and advantages of adaptive authentication;
How behavioral biometrics and mobile apps both play...
A recent analyst report stated 80% of respondents confirmed the use of Web Application Firewalls (WAFs) to protect public-facing websites and applications, but most have remained concerned their WAFs may not be covering all of their security requirements. Your basic WAFs could be risking your data to theft and...
Identity and Access Management (IAM) is moving beyond IT security and compliance to become a valuable enabler that drives business performance, digital transformation and competitive advantage.
Making your IAM program a success is not rocket science. But following the guidance provided in this paper will help you...
In the real world, governance is a major challenge. In fact, governance can't even be considered until access, security, control and management have been achieved.
If simply provisioning access is difficult, leveraging that access to enable business agility - the goal of governance - is impossible. If all your time...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.