An Arizona-based technical school is notifying nearly 209,000 current and former students, parents and faculty that their personal, health and financial information was potentially compromised in a LockBit attack earlier this year. The ransomware hack is one of many hits in the education sector.
Singapore-based telecom giant Singtel launched the country's first quantum-safe network across its identity and authentication platforms to help enterprises protect data from potential future quantum computing-related threats. The network integrates with Cisco, Fortinet and Nokia solutions.
Since he joined Jindal Steel & Power as CISO about 18 months ago, Aditya Vardhan has set specific cybersecurity goals. Vardhan established a data classification model, set up a security operations center and unified different identity repositories.
The theft of terabytes of Snowflake customers' data through credential stuffing hacks highlights how multifactor authentication shouldn't be optional for safeguarding accounts. Experts are calling on providers to build in more robust identity and authentication security features, at no extra cost.
Security researchers identified an attack method against a commonly used network authentication protocol that dates back to the dial-up internet and relies on an obsolete hashing function. Researchers say "a well-resourced attacker" could make it practical.
In the wake of multiple customers of Snowflake collectively losing terabytes of data to attackers, the cloud-based data warehousing platform has rolled out a swath of cybersecurity improvements, including allowing administrators to make multifactor authentication mandatory for all users.
The Monetary Authority of Singapore said banks will phase out one-time passwords for bank account logins over the next three months for customers who use digital tokens to authenticate their identity. The move follows a rise in phishing scams that impersonate banks in messages to steal credentials.
Brent Deterding, CISO at Afni, explained why simple security measures, such as YubiKeys and domain joins, can effectively neutralize sophisticated AI-driven attacks. He also discussed leadership in cybersecurity and the role CISOs play in determining materiality for SEC reporting.
Non-employee access poses a significant security risk, with 51% of organizations admitting to inappropriate access assignments.
This infographic outlines the challenges and solutions for managing third-party identities, including:
An Automated Approach to Onboarding;
Verifying and Terminating Access for...
Cybercrime is not just a threat; it's a trillion-dollar industry that's outpacing the global trade of illegal drugs.
This infographic breaks down the economics of cybercrime and underscores the critical need for an identity-first security strategy, including:
Percentage of recent attacks involving AI;
The...
The world is digital. It’s how we work now. That workforce is no longer just human users – employees, contractors, and vendors – but also bots or service accounts, each having their own set of access requirements, restrictions, and locations.
Additionally, there are applications and data spanning cloud,...
Cisco remained atop Forrester's OT security rankings, Palo Alto Networks climbed into the leader space, and Claroty and Tenable fell to strong performer. The transition from a network-centric to an asset- and data-centric security model has introduced challenges, especially with legacy equipment.
Identity startup Semperis has secured $125 million in growth financing to expand its engineering team and develop new product extensions to meet market demands. Strategic partnerships with J.P. Morgan and Hercules Capital also pave the way for potential future acquisitions.
With $150 million of Series D funding led by Kleiner Perkins, Meritech Capital and Sapphire Ventures, Huntress is set to build or buy posture and recovery capabilities for endpoint and identity protection and enhance educational initiatives to counter the accelerating pace of cyberthreats.
Multifactor authentication is a must-have security defense for repelling outright credential stuffing and password spraying attacks. But no defense is foolproof. Attackers have been refining their tactics for bypassing MFA, including using technology and trickery.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.