As general manager for payments and fraud prevention at Amazon Web Services, Keith Carlson has a unique perspective on detecting and preventing compromises in the cloud. He shares insights gleaned from dealing with scores of customers and their concerns.
Industry analysts first coined the term Identity-as-a-Service,
IDaaS in 2006. But today, the vast majority of IDaaS
implementations still focus on the "A" - access management -
leaving organizations to piece together the rest.
"The promise of IDaaS involves getting all identity
management...
A previously unnamed U.S. energy company that agreed to a record $2.7 million settlement after it left 30,000 records about its information security assets exposed online for 70 days in violation of energy sector cybersecurity regulations has been named as California utility PG&E.
Ransomware. Phishing. Credential stuffing. These are among the top threats to financial institutions of all sizes. Small-to-midsized ones are particularly challenged to detect and respond to these threats.
The expense and challenge of maintaining in-house cybersecurity resources are just too great for many...
T-Mobile has suffered a breach that may have exposed personal data for 2.3 million of its 77 million customers, and one security researcher says the hacker appears to be keen to sell the stolen data.
How is risk management evolving as a result of ubiquitous cybersecurity risks? Jennifer Bayuk, CEO of Decision Framework Systems, provides an overview.
In many organizations, overworked security analysts are trailing the bad guys in technology and knowledge, and this gap leads to increased risk, says Jeff Michael of Lastline.
Public cloud use is increasing as organizations leverage IaaS environments to improve operational agility and increase efficiency.
However, security teams are still struggling to maintain security visibility of dynamic, IaaS computing environments due to decentralization of IT, the expanding cloud attack surface,...
Security thought leaders have long called for organizations to shift from a conventional "peacetime" view of cybersecurity to more of a "wartime" mindset. Aetna CSO Jim Routh now says it's time for enterprises to shift from conventional to unconventional security controls.
A website that appeared to be part of a phishing campaign designed to gain access to the Democratic National Committee's voter database has turned out to be part of an uncoordinated security exercise. The false alarm has highlighted the benefit of actively monitoring for election interference.
Timing incident response actions correctly helps with rapid remediation and enables taking full control of the environment, says Mandiant's Steven D'sa.
Leading the latest edition of the ISMG Security Report: An analysis of why it may be too late to secure the 2018 U.S. midterm elections. Also: A close look at the Anthem breach lawsuit settlement and a report on ransomware recovery lessons learned.
Although the government has been slower than the private sector to adopt the cloud, there's no doubt that the shift is underway. IDC says "Cloud First" will become the new mantra for enterprise IT, noting that the major innovations taking place in IT today are not possible without the cloud as a foundation.
By...
Many organizations don't have a full grasp of their digital footprints, which attackers analyze closely when plotting intrusions, says Hans Barre of RiskIQ.
Australia is taking an aggressive approach to securing its critical infrastructure, which is vital to public safety and the economy, says Australian Member of Parliament Gai Brodtmann.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.