Users' work environment has changed practically overnight. While many have adapted to the changes, you are likely facing security issues and concerns that weren't present in the office.
Read this guide as it explores the following questions:
What Risks Do We Face With Employees Accessing Applications From...
Chaos ensued when miscreants interrupted a virtual bail hearing on Wednesday for the suspected Twitter hacker, hijacking the feed with screams, chatter and, for a few brief seconds, pornography. The meeting details were public, and the meeting had not been password protected.
Implementing a "zero trust" architecture for the remote workforce during the COVID-19 pandemic requires secure authentication methods, role-based access strategy and encryption standards based on micro-segmentation, according to a panel of security experts.
Suddenly, onboarding, servicing and securing digital accounts with advanced authentication techniques isn't just a priority for global enterprises; it is the priority. Dean Stevenson of HID Global previews an upcoming virtual roundtable discussion.
Twitter says attackers who hijacked more than 130 high-profile Twitter accounts used social engineering to bypass its defenses, including two-factor authentication on accounts. Experts say companies must have defenses in place against such schemes, which have long been employed by fraudsters.
An identity and access management strategy for a hybrid cloud environment should include single sign-on as well as multifactor authentication, says Andrew Koh, deputy general manager and regional lead-Risk at Habib Bank Ltd. in Singapore.
The Institute of International Finance, a global association of financial institutions, is focusing on strategies for using digital identification and machine learning to combat financial crime, says Matthew Ekberg, a senior policy adviser at the institute.
Five billion unique user credentials are circulating on darknet forums, with cybercriminals offering to sell access to bank accounts as well as domain administrator access to corporate networks, according to the security firm Digital Shadows.
A recently uncovered phishing campaign is using spoofed Zoom account alerts to steal Microsoft Office 365 credentials, according to a report from Abnormal Security. These attacks come as use of the platform soars due to work-from-home arrangements.
As we begin the second half of 2020, organizations must find ways to ensure their customers can engage with services at any time, from any device, securely. Enter: Customer identity and access management. In a preview of an upcoming roundtable, Okta's Keith Casey discusses CIAM maturity.
Joni Brennan, president of the Digital ID & Authentication Council of Canada (DIACC), says identity management is a core component to building a solid foundation for a socioeconomic safety net, particularly during a pandemic. However, engagement and education are also vital components to establishing a strong...
The year 2020 will be remembered as the landmark date when enterprises strove for business resilience and achieved digital transformation. Heading toward 2021, how can enterprises continue to evolve and provide value? Pamela Kubiatowski of Zscaler offers guidance.
The latest edition of the ISMG Security Report discusses global progress on adopting standard digital identifiers. Plus, a former cybercriminal discusses emerging fraud trends, and an update on the evolution of e-signatures.