newsWordPress users not on Windows urged to update due to critical LiteSpeed Cache flawUpdating to version 6.4 or higher will prevent exploitation of the vulnerability that allows attacker to gain admin access.By Lynn Greiner23 Aug 20243 minsThreat and Vulnerability ManagementIdentity and Access ManagementVulnerabilities how-to 3 key strategies for mitigating non-human identity risksBy Chris Hughes22 Aug 20246 minsData and Information SecurityIdentity and Access ManagementRisk Managementnews Dashlane study reveals massive spike in passkey adoptionBy Paul Barker31 Jul 20245 minsIdentity and Access ManagementSecurity featureNHIs may be your biggest — and most neglected — security holeBy Evan Schuman 23 Jul 20249 minsApplication SecurityIdentity and Access ManagementNetwork Security opinionReduce security risk with 3 edge-securing stepsBy Susan Bradley 01 Jul 20246 minsIdentity and Access ManagementRisk Management newsMicrosoft-owned vendor blamed for massive healthcare breachBy Shweta Sharma 26 Jun 20243 minsData BreachIdentity and Access Management featureWhat are non-human identities and why do they matter?By Chris Hughes 03 Jun 20248 minsAccess ControlIdentity and Access ManagementNetwork Security newsOkta alerts customers against new credential-stuffing attacksBy Shweta Sharma 31 May 20244 minsIdentity and Access ManagementVulnerabilities newsGathid’s new access mapping tech promises affordable and streamlined IAMBy Shweta Sharma 10 Apr 20243 minsIdentity and Access ManagementSecurity Software Articlesnews analysisGoogle Chrome aims to solve account hijacking with device-bound cookiesNew feature is designed to stop bad actors from intrusions that rely on stealing session cookies by using TPM crypto processors to securely store keys locally.By Lucian Constantin 05 Apr 2024 8 minsBrowser SecurityInternet SecurityIdentity and Access ManagementfeatureWhat is identity fabric immunity? Abstracting identity for better securityCISOs struggling to manage a diverse and complex identity access management infrastructure should start thinking about identity fabric immunity.By Matthew Tyson 03 Apr 2024 11 minsCSO and CISOApplication SecurityIdentity and Access ManagementnewsTelesign launches integrated API to combine traditional identity verification channels Verify API will let customers choose any of the seven verification channels to silently verify all end-users.By Shweta Sharma 27 Mar 2024 3 minsAuthenticationIdentity and Access ManagementSecurity SoftwarefeatureRedefining multifactor authentication: Why we need passkeysAs attackers become more adept at defeating authentication apps and IP fencing, passkeys are a more secure and user-friendly alternative.By Joe Stocker 15 Mar 2024 8 minsMulti-factor AuthenticationAuthenticationIdentity and Access ManagementfeatureHow to strengthen your Kubernetes defensesKubernetes-focused attacks are on the rise. Here is an overview of the current threats and best practices for securing your clusters.By David Strom 13 Feb 2024 8 minsDevSecOpsApplication SecurityIdentity and Access ManagementnewsCisco’s identity and access security offerings to receive AI upgradesNew AI-powered identity visibility, along with a few other AI advancements, is expected to improve Cisco’s existing security offerings.By Shweta Sharma 06 Feb 2024 3 minsIdentity and Access ManagementfeatureProtecting Windows networks: Get back to basics for the new yearWhile it may be tempting to adopt new Microsoft Windows network protection tactics, methods, and software, a better approach is to review and refine what’s already in place. By Susan Bradley 09 Jan 2024 6 minsPasswordsWindows SecurityIdentity and Access ManagementnewsAmazon debuts biometric security device, updates Detective and GuardDutyAmazon’s latest security offerings, announced at its re:Invent conference, cover everything from advanced biometrics to new tools for defeating runtime and cloud threats, including identity and access management (IAM) capabilities.By Jon Gold 29 Nov 2023 3 minsBiometricsSecurity Monitoring SoftwareThreat and Vulnerability ManagementfeatureThe alarming rise of quishing is a red flag for CISOsMultiple reports show a dramatic rise in phishing scams employing QR codes. Now is the time for security leaders to take proactive steps.By Matthew Tyson 21 Nov 2023 8 minsPhishingIdentity and Access ManagementSecurity PracticesopinionThe SSO tax is killing trust in the security industryApplication providers charge fees to implement single sign-on but don't deliver a full SSO experience. Threat actors are taking advantage of the situation.By Joe Sullivan and Atul Tulshiibagwale 21 Nov 2023 10 minsAuthenticationSingle Sign-onIdentity and Access ManagementfeatureAs perimeter defenses fall, the identify-first approach steps into the breachMore security chiefs are seeking to make identity a centerpiece of their security programs, but challenges persist.By Mary K. Pratt 14 Nov 2023 9 minsCSO and CISOZero TrustIdentity and Access ManagementfeatureKeep it secret, keep it safe: the essential role of cybersecurity in document managementUntold quantities of sensitive data reside in the huge variety of documents that accumulate over the lifetime of an organization. Keeping them safe no matter where they’re stored should be a top priority.By Linda Rosencrance 08 Nov 2023 8 minsCSO and CISOCloud SecurityData and Information Security Show more Show less View all Resources whitepaper Real-Time, All the Time: Fuelling AI success through a continuous data stream With AI dominating conversations everywhere, practitioners and executives are seeking answers: How to succeed with GenAI? Delivering on AI initiatives requires the right strategy, platform and data stack. The post Real-Time, All the Time: Fuelling AI success through a continuous data stream appeared first on Whitepaper Repository –. By StreamSets 26 Aug 2024Artificial IntelligenceData and Information SecurityData Management whitepaper 2023 GigaOm Radar Report on Autonomous Security Operation Center (SOC) Solutions [XSIAM] By Palo Alto Networks 11 Jul 2024Artificial IntelligenceSecuritySecurity Software whitepaper XSIAM E-Book: Machine-Led, Human-Empowered Platform By Palo Alto Networks 11 Jul 2024SecuritySecurity InfrastructureSecurity Operations Center View all Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos feature How to ensure cybersecurity strategies align with the company’s risk tolerance By Rosalyn Page 03 Sep 202410 mins CSO and CISORisk Management news North Korean hackers actively exploited a critical Chromium zero-day By Shweta Sharma 02 Sep 20243 mins Zero-day vulnerability feature Ransomware recovery: 8 steps to successfully restore from backup By Maria Korolov 02 Sep 202417 mins RansomwareMalwareBackup and Recovery podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO video CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins RansomwareZero TrustCloud Security video CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video Cybersecurity Insights for Tech Leaders: Addressing Dynamic Threats and AI Risks with Resilience 10 Jul 202424 mins CSO and CISO