Data Protection June 13, 2018 A Proposed Solution to the Password Reuse Problem 3 min read - A group of researchers proposed a new framework that would enable web services to share users' password hash data in an effort to reduce password reuse.
Cloud Security June 13, 2018 Four Ways IDaaS Can Help You Overcome Cloud Identity Hurdles 2 min read - An investment in IDaaS solutions can help organizations overcome common cloud identity challenges related to infrastructure support, specialized staffing, consistent deployments and maintenance.
June 8, 2018 More Than One-Tenth of US Consumers Fell Victim to Identity Theft in the Past Year 2 min read - A recent survey revealed that many consumers fail to change their online security habits even after falling victim to identity theft.
June 5, 2018 Poor Identity Theft Awareness Leads to Common User Risks 2 min read - The key to improving identity theft awareness is to understand the risks, which include phishing attacks, digital trust abuse, poor password management, BYOD policies and more.
Identity & Access May 30, 2018 The Inadvertent Insider Threat: A CISO Confronts a Breach From Within 7 min read - Human error, credential misuse and disgruntled employees aren't the most common threats security leaders have to face — but the complexities of these incidents make insider threats the stuff of CISO nightmares.
Risk Management May 30, 2018 The Compliance Crisis: A Compliance Officer Faces an Outdated Risk Management Framework 5 min read - Follow along with risk and compliance officer Frank Roth as he endeavors to fill in the gaps of an outdated (and incomplete) risk management framework in his new role at a utility company.
Cloud Security May 30, 2018 The Cloud Commotion: An IT Director’s Road to Cloud Transformation 6 min read - Follow the decision-making process of IT director Shira Sutton as she endeavors to avoid security risks and unnecessary business continuity headaches on the journey to cloud transformation.
Application Security May 30, 2018 The Modernization Misstep: A CEO Takes on Digital Transformation 5 min read - Step into the shoes of an insurance company CEO chasing digital transformation. Read on as she tries to avoid missteps in this story about modernization, risks, fraud and user experience.
Identity & Access May 15, 2018 What Is Next-Generation Privileged Account Management? 3 min read - Organizations need a privileged account management (PAM) solution that integrates seamlessly with the existing security environment — and helps security teams enforce least privilege policies.
Data Protection May 9, 2018 A Whole New Ballgame: Applying the Immune System Approach to Sporting Event Cybersecurity 3 min read - Emerging mobile and cloud-based technologies present many new challenges pertaining to sporting event cybersecurity.