Access control, Cloud security
August 12, 2016
Via: Security IntelligenceEnvision B2C scenarios like online retail to customer, university to student or retail banking to account holder: Users come and go, and user management can quickly become burdensome, especially in traditional identity and access management (IAM) environments. Managing millions of […]
July 8, 2016
Via: CSO OnlineThe callers are polite, and they sound very earnest, explaining in great detail how hackers can loot your bank accounts, steal your identity, and compromise passwords. They are intent on convincing you the threat is not only real but hackers […]
June 13, 2016
Via: ITSecurity UKWouldn’t it be something if you managed to spear-phish the technical director of an anti-malware company? The criminal kudos would be sky-high; but just imagine the possible effect of getting top-level credentials into a cloud-based anti-malware product that automatically pushes […]
February 9, 2016
Via: Dark ReadingIsn’t it difficult to put a price tag on digital security? We can compare security budgets across our peers, calculate the cost of a security breach, and even estimate the probability of various threats, but we cannot definitively state that […]
February 9, 2016
Via: Security IntelligenceIn my rather long career in product development, I have asked myself many times what would have made my products successful in the market. I reached the conclusion that the features and extensibility of the product itself are not enough, […]
January 27, 2016
Via: Security WeekAs the name implies, DLP is about preventing loss or misuse of data. By various means, including content discovery and analysis, it helps preclude end users from accidentally or maliciously sharing sensitive, critical, and confidential data that might put a […]
November 23, 2015
Via: CIOAn analysis of hundreds of publicly available firmware images for routers, DSL modems, VoIP phones, IP cameras and other embedded devices uncovered high-risk vulnerabilities in a significant number of them, pointing to poor security testing by manufacturers. The study was […]
September 22, 2015
Via: data-lossOver the past 10 years of #data breach history, 41 percent of breaches were caused not by hacking, but by device loss. Because of a particularly bad record of holding track of its #devices, the #healthcare industry has been responsible […]
June 25, 2015
Via: hackerWebsense revealed a high degree of specialization among criminals attacking financial services, a huge investment in the lure attack phase and the specific and anomalous attacks pointed at global targets dealing in finance. By analyzing data on attack patterns unique […]
March 12, 2015
Via: hacker#kaspersky lab researchers continue to analyze the #software and digital artifacts tied to the Equation Group, a nation-state threat actor that has been active for almost twenty years, and to present their discoveries to the public. They shared more information […]
April 30, 2024
April 11, 2024
April 30, 2024