Cloud computing has already led to a fundamental shift in the enterprise computing paradigm, and security now needs to follow, says Gartner's Steve Riley, who shares recommendations.
Security expert Sean Sullivan isn't surprised that the massive 2014 breach of Yahoo, which exposed at least 500 million account details, only recently came to light. Here's why, as well as what users must learn from this breach.
Forty-seven percent of survey respondents rate their organizations at above average or superior when it comes to provisioning, managing and attesting to identities and access to secured resources within their networks.
And yet ...
50 percent either know their organizations were breached in the past year, or they...
Passwords' days are numbered as businesses attempt to deliver a better user experience to their online customers, as well as apply better identity management practices, says CA's Paul Briault.
A new research project called Amnesia tackles the password management problem by not storing full data in any one place where it can be hacked. But does this proposed solution truly offer better password security?
Along with DNS, digital keys and certificates are at the foundation of any layered cybersecurity defense. Moreover, keys and certificates are akin to HLAs (Human Leukocyte Antigens) because they serve as unique identifiers giving authorized users access to encrypted systems.
But vulnerabilities, such as Heartbleed...
Privileged users are typically associated with a company's IT department and can include database administrators, network engineers, IT security practitioners, etc. However, across an organization there may be other privileged users that should not be overlooked. A privileged user can be anyone from account managers...
Security leaders say data science is becoming the building block of contemporary security solutions, showing great promise for developing necessary cyber defences. But where and how is data science best deployed?
A mass password reset by Citrix-owned GoToMyPC shows how online service providers are still grappling with the fallout from recent large data breaches.
The maturity of the network access control (NAC) market presents organizations with a strong selection of vendors that offer evolved capabilities. Enterprises are prioritizing low-level complexity of administration, flexibility of controls, ease of integration, and competitive product pricing as the main selection...
Identity-Powered security solutions work by integrating identity information with security monitoring, providing the security intelligence needed to detect and respond to anomalous activity that signals a data breach or compliance gap. Today's Identity and Security Management solutions should provide visibility and...
The definition of trust in the real and digital world scenarios is crucial to understand. The session focuses on the prevalent fraud industry and the services offered, together with the reasons behind the key pains for the CIO and CISO community across the South Asia territory. The session will be touching upon the...
Identity and access management should empower businesses, satisfying customers and other stakeholders who need secure access to an enterprise's data and systems, says security expert Jeremy Grant, former leader at the federal government's National Strategy for Trusted Identities in Cyberspace.
With hack attacks continuing against banks, SWIFT must follow in the footsteps of other vendors - notably Microsoft - and begin offering detailed, prescriptive security guidance to its users, says Doug Gourlay of Skyport Systems.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.