newsWordPress users not on Windows urged to update due to critical LiteSpeed Cache flawUpdating to version 6.4 or higher will prevent exploitation of the vulnerability that allows attacker to gain admin access.By Lynn Greiner23 Aug 20243 minsThreat and Vulnerability ManagementIdentity and Access ManagementVulnerabilities how-to 3 key strategies for mitigating non-human identity risksBy Chris Hughes22 Aug 20246 minsData and Information SecurityIdentity and Access ManagementRisk Managementopinion Reduce security risk with 3 edge-securing stepsBy Susan Bradley01 Jul 20246 minsIdentity and Access ManagementRisk Management newsMicrosoft-owned vendor blamed for massive healthcare breachBy Shweta Sharma 26 Jun 20243 minsData BreachIdentity and Access Management featureWhat are non-human identities and why do they matter?By Chris Hughes 03 Jun 20248 minsAccess ControlIdentity and Access ManagementNetwork Security newsOkta alerts customers against new credential-stuffing attacksBy Shweta Sharma 31 May 20244 minsIdentity and Access ManagementVulnerabilities newsGathid’s new access mapping tech promises affordable and streamlined IAMBy Shweta Sharma 10 Apr 20243 minsIdentity and Access ManagementSecurity Software news analysisGoogle Chrome aims to solve account hijacking with device-bound cookiesBy Lucian Constantin 05 Apr 20248 minsBrowser SecurityInternet SecurityIdentity and Access Management featureWhat is identity fabric immunity? Abstracting identity for better securityBy Matthew Tyson 03 Apr 202411 minsCSO and CISOApplication SecurityIdentity and Access Management ArticlesnewsTelesign launches integrated API to combine traditional identity verification channels Verify API will let customers choose any of the seven verification channels to silently verify all end-users.By Shweta Sharma 27 Mar 2024 3 minsAuthenticationIdentity and Access ManagementSecurity SoftwarefeatureRedefining multifactor authentication: Why we need passkeysAs attackers become more adept at defeating authentication apps and IP fencing, passkeys are a more secure and user-friendly alternative.By Joe Stocker 15 Mar 2024 8 minsMulti-factor AuthenticationAuthenticationIdentity and Access ManagementfeatureHow to strengthen your Kubernetes defensesKubernetes-focused attacks are on the rise. Here is an overview of the current threats and best practices for securing your clusters.By David Strom 13 Feb 2024 8 minsDevSecOpsApplication SecurityIdentity and Access ManagementnewsCisco’s identity and access security offerings to receive AI upgradesNew AI-powered identity visibility, along with a few other AI advancements, is expected to improve Cisco’s existing security offerings.By Shweta Sharma 06 Feb 2024 3 minsIdentity and Access ManagementfeatureProtecting Windows networks: Get back to basics for the new yearWhile it may be tempting to adopt new Microsoft Windows network protection tactics, methods, and software, a better approach is to review and refine what’s already in place. By Susan Bradley 09 Jan 2024 6 minsPasswordsWindows SecurityIdentity and Access ManagementnewsAmazon debuts biometric security device, updates Detective and GuardDutyAmazon’s latest security offerings, announced at its re:Invent conference, cover everything from advanced biometrics to new tools for defeating runtime and cloud threats, including identity and access management (IAM) capabilities.By Jon Gold 29 Nov 2023 3 minsBiometricsSecurity Monitoring SoftwareThreat and Vulnerability ManagementfeatureThe alarming rise of quishing is a red flag for CISOsMultiple reports show a dramatic rise in phishing scams employing QR codes. Now is the time for security leaders to take proactive steps.By Matthew Tyson 21 Nov 2023 8 minsPhishingIdentity and Access ManagementSecurity PracticesopinionThe SSO tax is killing trust in the security industryApplication providers charge fees to implement single sign-on but don't deliver a full SSO experience. Threat actors are taking advantage of the situation.By Joe Sullivan and Atul Tulshiibagwale 21 Nov 2023 10 minsAuthenticationSingle Sign-onIdentity and Access ManagementfeatureAs perimeter defenses fall, the identify-first approach steps into the breachMore security chiefs are seeking to make identity a centerpiece of their security programs, but challenges persist.By Mary K. Pratt 14 Nov 2023 9 minsCSO and CISOZero TrustIdentity and Access ManagementfeatureKeep it secret, keep it safe: the essential role of cybersecurity in document managementUntold quantities of sensitive data reside in the huge variety of documents that accumulate over the lifetime of an organization. Keeping them safe no matter where they’re stored should be a top priority.By Linda Rosencrance 08 Nov 2023 8 minsCSO and CISOCloud SecurityData and Information SecuritynewsFacebook tops security ratings among social networksEnterprise-grade authentication remains an Achilles heel of the social media world, but security is improving in other areas, according to a report by access management provider Cerby.By Jon Gold 07 Nov 2023 3 minsInternet SecurityIdentity and Access ManagementPrivacynewsFrontegg releases new identity, user management solution for SaaS productsFrontegg Forward delivers four fundamental user identity management innovations for SaaS vendors.By Michael Hill 07 Nov 2023 4 minsAuthenticationAccess ControlIdentity Management Solutions Show more Show less View all Resources whitepaper Best Practices in Cybersecurity and Cyber Resilience In today’s digital world, consumers and employees expect organizations of all types and sizes to operate without interruption. In fact, contractual obligations and service level agreements demand it. The post Best Practices in Cybersecurity and Cyber Resilience appeared first on Whitepaper Repository –. By Cohesity Inc. 26 Aug 2024Business OperationsCybercrimeData and Information Security whitepaper Cyber resilience in the ransomware era By Cohesity Inc. 26 Aug 2024Business OperationsCybercrimeSecurity whitepaper Unlock the power of AI and ML for data protection By Cohesity Inc. 26 Aug 2024Artificial IntelligenceBusiness OperationsMachine Learning View all Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos feature How to ensure cybersecurity strategies align with the company’s risk tolerance By Rosalyn Page 03 Sep 202410 mins CSO and CISORisk Management news North Korean hackers actively exploited a critical Chromium zero-day By Shweta Sharma 02 Sep 20243 mins Zero-day vulnerability feature Ransomware recovery: 8 steps to successfully restore from backup By Maria Korolov 02 Sep 202417 mins RansomwareMalwareBackup and Recovery podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO video CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins RansomwareZero TrustCloud Security video CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video Cybersecurity Insights for Tech Leaders: Addressing Dynamic Threats and AI Risks with Resilience 10 Jul 202424 mins CSO and CISO