Identity & Access April 3, 2019 Reap the Promise of One and Done Authentication With Single Sign-On (SSO) 4 min read - With SSO, employees can use one set of credentials to access all their apps instead of remembering, looking up and frequently resetting multiple passwords.
March 27, 2019 Data Leak Involving Family Tracking App Exposed 238,000 Users’ Real-Time Locations for Weeks 2 min read - A data leak involving a family tracking app exposed the real-time locations of more than 238,000 users for weeks as a result of a database misconfiguration.
March 25, 2019 Personal Health Details of More Than 350,000 Oregonians Potentially Exposed in HIPAA Breach 2 min read - Unauthorized individuals compromised and potentially exposed more than 350,000 Oregonians' protected health information (PHI) in a HIPAA breach.
Software Vulnerabilities March 4, 2019 Stranger Danger: X-Force Red Finds 19 Vulnerabilities in Visitor Management Systems 4 min read - Two X-Force Red interns discovered 19 previously undisclosed vulnerabilities across five popular visitor management systems that could enable attackers to establish a foothold on corporate networks.
Data Protection February 18, 2019 Are Passwords Killing Your Customer Experience? Try Passwordless Authentication 3 min read - By implementing passwordless authentication, organizations can deliver the experience customers deserve and the security they demand.
Application Security February 7, 2019 Moving to the Hybrid Cloud? Make Sure It’s Secure by Design 4 min read - Failure to consider security when developing a hybrid cloud can lead to unanticipated problems that don't exist in typical technology infrastructure.
Identity & Access February 6, 2019 Design Your IAM Program With Your Users in Mind 7 min read - To gain the buy-in you need to make your IAM program successful, it's important to consider your employees' goals and needs during the design process.
Identity & Access January 21, 2019 Multifactor Authentication Delivers the Convenience and Security Online Shoppers Demand 4 min read - When framed as an innovative, even "cool" feature, multifactor authentication can deliver the security online retail customers demand without diminishing the user experience.
Intelligence & Analytics January 17, 2019 Bring Order to Chaos By Building SIEM Use Cases, Standards, Baselining and Naming Conventions 4 min read - Standards, baselines and naming conventions can remove barriers to threat detection and response and help security teams build effective SIEM use cases.
CISO January 4, 2019 Your Security Strategy Is Only as Strong as Your Cyber Hygiene 3 min read - Without full network visibility and regular utilization of cyber hygiene best practices, your enterprise could face very real, but entirely preventable, security risks.