Identity & Access Management

How Does Coinbase Combat Cyber Threats Without Paying Ransom?
Identity & Access Management How Does Coinbase Combat Cyber Threats Without Paying Ransom?

In today's digital age, the rise of cryptocurrency has simultaneously paved the way for a new wave of complex cyber threats. These threats often target both financial institutions and their customers, aiming to exploit vulnerabilities for financial gain. Recently, Coinbase, a leading cryptocurrency

Are Passkeys the Future of Passwordless Authentication?
Identity & Access Management Are Passkeys the Future of Passwordless Authentication?

Rupert Marais is renowned for his expertise in security strategy, specializing in endpoint and device protection, cybersecurity frameworks, and network management. His insights are invaluable for understanding today's complex security landscape. In this interview, we'll explore various aspects of

NY's Cybersecurity Rule: Revolutionizing Finance Firms' Safety
Identity & Access Management NY's Cybersecurity Rule: Revolutionizing Finance Firms' Safety

New York's cybersecurity regulations, encapsulated in 23 NYCRR Part 500 and enforced by the New York Department of Financial Services (NYDFS), have ushered in a new era of safety standards for finance firms. These regulations underscore a crucial shift toward heightened cybersecurity protocols

Are Increased Security Costs Stretching Multnomah County's Budget?
Identity & Access Management Are Increased Security Costs Stretching Multnomah County's Budget?

Multnomah County recently decided to reallocate funds from multiple departments to address unforeseen security expenses for the fiscal year. The Board of Commissioners approved a budget readjustment of $2.2 million to boost security measures at various county facilities, including a newly

Balancing Password Security and User Experience for Optimal UX
Identity & Access Management Balancing Password Security and User Experience for Optimal UX

Balancing password security with user experience (UX) has become increasingly critical in today's digital landscape. Users often prioritize ease of access over stringent security measures, leading to unsafe password practices that threaten both personal and professional cybersecurity. If

How Can Influencers Protect Themselves from Online Scams?
Identity & Access Management How Can Influencers Protect Themselves from Online Scams?

Caroline Donoghue, a Sussex-based dog groomer with nearly 700,000 followers, fell victim to an online scam targeting social media influencers. Pretending to be a booker for a real podcast, the scammer requested access to her Meta Business Suite for a livestream arrangement. On the planned recording

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later