In the latest weekly update, ISMG editors discuss the industrywide implications of a teenager hacking into Uber's internal systems, key trends in the new Gartner SD-WAN Magic Quadrant report, and how ethics and security culture are center stage due to recent CISO revelations at Uber and Twitter.
Decentralized identifiers and verifiable credentials, in which consumers can use their digital identity credentials for a variety of tasks, have significant evolving potential within the realm of identity and access management, says Merritt Maxim, vice president and research director at Forrester.
Japanese conglomerate Hitachi has sold its small identity-as-a-service practice to Canadian software specialist Volaris Group to drive better execution around core products. The firm found it was easy to get lost within Hitachi given the conglomerate's size and focus on electronics and engineering.
NortonLifeLock and Avast completed their $8.6 billion merger Monday, forming a $3.5 billion consumer cyber protection behemoth with expertise across security, privacy and identity. The fully merged company will have fewer than 4,000 employees and will initially go to market as NortonLifeLock.
We are back! In-person events are back! The Cyberark team looks forward to welcoming you at the Westin Harbour Castle for the Impact Tour on November 15th
Join us for this in-person one-day event where you will hear from CyberArk executives and industry leaders on top security initiatives. Engage with local...
Vikas Malhotra, country manager, LastPass, discusses establishing a password management program as the first line of defense in establishing user identity, followed by 2FA and MFA as the second step in the protection process.
An identity-centric approach to security will establish legitimate user behavior against suspicious user behavior using SIEM solution, coupled with machine learning algorithms, says Vivin Sathyan, senior technical evangelist at ManageEngine.
Today's big challenge for practitioners is identifying the "known and unknown" attack surface faster than the hackers. There is a need to build purpose-built sensors and asset management strategies to discover unknown attacks, says Debashish Jyotiprakash, vice president - Asia at Qualys.
Bitwarden has raised $100 million to expand into new product areas including developer secrets, passwordless and privileged access management. The investment will help the firm debut new features for individual and business users and expand its footprint in Japan, Germany, France and South America.
A month after his firm was taken private in a $6.9 billion deal, SailPoint founder and CEO Mark McClain discusses the prospect of consolidation, emerging competition and plans to expand "more quickly and aggressively" in the identity governance space - thanks to Thoma Bravo's financial backing.
Digital transformation shows no signs of slowing down, even in a post-pandemic hybrid workforce. In fact, this new business paradigm continues to place an increased resource strain on security teams and cybersecurity debt permeates organizations. A recent survey of IT security decision makers uncovered that more than...
Why is business identity theft increasing, and what are the latest tactics fraudsters are using to scam businesses and gig workers? Eva Velasquez, CEO at the Identity Theft Resource Center, shares her views on how business identity theft has evolved over the years and how to prevent it.
One of the biggest challenges for cybercriminals is how to defeat multifactor authentication. New research has uncovered a criminal service called "EvilProxy" that uses a technique called session hijacking to steal session cookies to bypass MFA and compromise accounts.
As ransomware attacks grow, cyber insurance costs are skyrocketing, leaving small to midsized firms with tough decisions about insuring against threats, beefing up security and whether to pay or not pay ransom demands, says Diktesh Singh Puri, IT and cloud operations head at Reckitt Benckiser Group.
Ben Goodman, Okta's Asia-Pacific senior vice president and general manager, explains why critical infrastructure companies lag behind born-in-the-cloud companies in zero trust adoption. He expects traditional industries to adopt zero trust for some application services and then expand into others.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.