access management

Short-term AWS access tokens allow attackers to linger for a longer while

Short-term AWS access tokens allow attackers to linger for a longer while 07/12/2023 at 17:32 By Zeljka Zorz Attackers usually gain access to an organization’s cloud assets by leveraging compromised user access tokens obtained via phishing, by using malware, or by finding them in public code repositories. These are long-term access tokens associated with an […]

React to this headline:

Loading spinner

Short-term AWS access tokens allow attackers to linger for a longer while Read More »

Microsoft introduces new access policies in Entra to boost MFA usage

Microsoft introduces new access policies in Entra to boost MFA usage 07/11/2023 at 18:17 By Helga Labus As part of a broader initiative to strengthen security, Microsoft is rolling out Microsoft-managed Conditional Access policies in Entra ID (formerly Azure Active Directory) to increase the use of multifactor authentication (MFA) for enterprise accounts. Microsoft Entra Conditional

React to this headline:

Loading spinner

Microsoft introduces new access policies in Entra to boost MFA usage Read More »

Business resilience becomes primary force behind cybersecurity investments

Business resilience becomes primary force behind cybersecurity investments 19/10/2023 at 06:03 By Help Net Security Over 80% of northern European organizations emphasize that the need to ensure business resilience is the top driver for their cybersecurity investments, according to Nixu. The report reveals both encouraging progress and increasing concerns. Alarmingly, 50% of organizations reach only

React to this headline:

Loading spinner

Business resilience becomes primary force behind cybersecurity investments Read More »

Why zero trust delivers even more resilience than you think

Why zero trust delivers even more resilience than you think 10/10/2023 at 08:04 By Help Net Security Ten years ago, zero trust was an exciting, innovative perspective shift that security experts were excited to explore; today, it’s more likely to be framed as an inevitable trend than as a mere option on the security menu.

React to this headline:

Loading spinner

Why zero trust delivers even more resilience than you think Read More »

How to avoid the 4 main pitfalls of cloud identity management

How to avoid the 4 main pitfalls of cloud identity management 28/09/2023 at 08:02 By Help Net Security Securing cloud identities isn’t easy. Organizations need to complete a laundry list of actions to confirm proper configuration, ensure clear visibility into identities, determine and understand who can take what actions, and on top of it all

React to this headline:

Loading spinner

How to avoid the 4 main pitfalls of cloud identity management Read More »

Avoidable digital certificate issues fuel data breaches

Avoidable digital certificate issues fuel data breaches 06/09/2023 at 06:02 By Help Net Security Among organizations that have suffered data breaches 58% were caused by issues related to digital certificates, according to a report by AppViewX and Forrester Consulting. As a result of service outages, 57% said their organizations have incurred costs upwards of $100,000

React to this headline:

Loading spinner

Avoidable digital certificate issues fuel data breaches Read More »

Understand the fine print of your cyber insurance policies

Understand the fine print of your cyber insurance policies 01/09/2023 at 06:32 By Help Net Security A significant gap is emerging between insurance providers, as organizations skip the fine print and seek affordable and comprehensive coverage, potentially putting them in a tough place when they need to use this safety net, according to a Delinea

React to this headline:

Loading spinner

Understand the fine print of your cyber insurance policies Read More »

Lack of visibility into cloud access policies leaves enterprises flying blind

Lack of visibility into cloud access policies leaves enterprises flying blind 24/08/2023 at 06:00 By Help Net Security Fragmented access policies are top security concern in multi-cloud environments, with more than 75% of enterprises reporting they do not know where applications are deployed and who has access to them, according to Strata Identity. Cloud security

React to this headline:

Loading spinner

Lack of visibility into cloud access policies leaves enterprises flying blind Read More »

CISOs under pressure: Protecting sensitive information in the age of high employee turnover

CISOs under pressure: Protecting sensitive information in the age of high employee turnover 17/07/2023 at 07:31 By Mirko Zorz In this Help Net Security interview, Charles Brooks, Adjunct Professor at Georgetown University’s Applied Intelligence Program and graduate Cybersecurity Programs, talks about how zero trust principles, identity access management, and managed security services are crucial for

React to this headline:

Loading spinner

CISOs under pressure: Protecting sensitive information in the age of high employee turnover Read More »

75% of consumers prepared to ditch brands hit by ransomware

75% of consumers prepared to ditch brands hit by ransomware 05/07/2023 at 07:32 By Help Net Security As 40% of consumers harbor skepticism regarding organizations’ data protection capabilities, 75% would shift to alternate companies following a ransomware attack, according to Object First. Consumers request data protection Furthermore, consumers request increased data protection from vendors, with

React to this headline:

Loading spinner

75% of consumers prepared to ditch brands hit by ransomware Read More »

Scroll to Top