Two X-Force Red interns discovered 19 previously undisclosed vulnerabilities across five popular visitor management systems that could enable attackers to establish a foothold on corporate networks.
Researchers discovered new Trojan malware written in Golang that's targeting e-commerce websites with brute-force attacks.
A recent phishing campaign used a fake Google reCAPTCHA as part of its efforts to target Polish bank employees with malware.
By implementing passwordless authentication, organizations can deliver the experience customers deserve and the security they demand.
Failure to consider security when developing a hybrid cloud can lead to unanticipated problems that don't exist in typical technology infrastructure.
To gain the buy-in you need to make your IAM program successful, it's important to consider your employees' goals and needs during the design process.
Laurene Hummer used to answer society's big energy questions. Now she's helping you access your applications more easily as the "mini CEO" of IBM Security's identity and access management offering.
Threat actors will soon gain access to artificial intelligence (AI) tools that will enable them to defeat multiple kinds of authentication systems, even biometric security.
Intelligent access certification helps security teams improve visibility into access, prioritize compliance tasks with risk-based insights and make better decisions with actionable intelligence.
How Former Bomb Disposal Expert and Lighting Designer Shaked Vax Pivoted Toward a Cybersecurity Career
Shaked Vax dismantled bombs and created light shows for rock stars before starting his cybersecurity career. Now he's leading IBM Trusteer's move into frictionless identity management.