identity

How much does cloud-based identity expand your attack surface?

How much does cloud-based identity expand your attack surface? 2024-03-29 at 08:01 By Help Net Security We all know using a cloud-based identity provider (IdP) expands your attack surface, but just how big does that attack surface get? And can we even know for sure? As Michael Jordan once said, “Get the fundamentals down, and […]

React to this headline:

Loading spinner

How much does cloud-based identity expand your attack surface? Read More »

Cybercriminals use cheap and simple infostealers to exfiltrate data

Cybercriminals use cheap and simple infostealers to exfiltrate data 2024-03-28 at 06:01 By Help Net Security The rise in identity-based attacks can be attributed to a rapid increase in malware, according to SpyCloud. Researchers found that 61% of data breaches in 2023, involving over 343 million stolen credentials, were infostealer malware-related. Of these compromised identity

React to this headline:

Loading spinner

Cybercriminals use cheap and simple infostealers to exfiltrate data Read More »

Key MITRE ATT&CK techniques used by cyber attackers

Key MITRE ATT&CK techniques used by cyber attackers 2024-03-15 at 11:01 By Help Net Security While the threat landscape continues to shift and evolve, attackers’ motivations do not, according to a Red Canary report. The classic tools and techniques adversaries deploy remain consistent–with some notable exceptions. The report tracked MITRE ATT&CK techniques that adversaries abuse

React to this headline:

Loading spinner

Key MITRE ATT&CK techniques used by cyber attackers Read More »

Major shifts in identity, ransomware, and critical infrastructure threat trends

Major shifts in identity, ransomware, and critical infrastructure threat trends 2024-03-07 at 07:20 By Help Net Security In this Help Net Security video, Michelle Alvarez, Strategic Threat Analysis Manager at IBM X-Force, discusses the 2024 X-Force Threat Intelligence Index, revealing top threats and trends the team observed last year across its global engagements and how

React to this headline:

Loading spinner

Major shifts in identity, ransomware, and critical infrastructure threat trends Read More »

Avast ordered to pay $16.5 million for misuse of user data

Avast ordered to pay $16.5 million for misuse of user data 2024-02-23 at 13:18 By Help Net Security The Federal Trade Commission will require software provider Avast to pay $16.5 million and prohibit the company from selling or licensing any web browsing data for advertising purposes to settle charges that the company and its subsidiaries

React to this headline:

Loading spinner

Avast ordered to pay $16.5 million for misuse of user data Read More »

The old, not the new: Basic security issues still biggest threat to enterprises

The old, not the new: Basic security issues still biggest threat to enterprises 2024-02-23 at 08:01 By Help Net Security In 2023, cybercriminals saw more opportunities to “log in” versus hack into corporate networks through valid accounts – making this tactic a preferred weapon for threat actors, according to IBM’s 2024 X-Force Threat Intelligence Index.

React to this headline:

Loading spinner

The old, not the new: Basic security issues still biggest threat to enterprises Read More »

A closer look at Israeli cybersecurity funding and M&A activity in 2023

A closer look at Israeli cybersecurity funding and M&A activity in 2023 2024-02-21 at 07:01 By Help Net Security Last year was challenging for the global market, and the market downturn greatly affected even the historically resilient cybersecurity ecosystem. In this Help Net Security video, Merav Ben Avi, Content Manager at YL Ventures, talks about

React to this headline:

Loading spinner

A closer look at Israeli cybersecurity funding and M&A activity in 2023 Read More »

How decentralized identity is shaping the future of data protection

How decentralized identity is shaping the future of data protection 2024-02-20 at 07:32 By Mirko Zorz In this Help Net Security interview, Patrick Harding, Chief Architect at Ping Identity, discusses the promises and implications of decentralized identity (DCI) in cybersecurity. By redistributing identity management responsibilities among issuers, holders, and verifiers, DCI empowers individuals to selectively

React to this headline:

Loading spinner

How decentralized identity is shaping the future of data protection Read More »

Why identity fraud costs organizations millions

Why identity fraud costs organizations millions 2024-02-20 at 07:01 By Help Net Security 92% of respondents to a recent report shared that their organization had been a victim of identity fraud, costing an average of $4.3 million over the last 12 months. Even so, only 40% stated identity verification as a top identity challenge, noting

React to this headline:

Loading spinner

Why identity fraud costs organizations millions Read More »

Cybercriminals get productivity boost with AI

Cybercriminals get productivity boost with AI 2024-02-14 at 06:31 By Help Net Security While AI technology has the potential to streamline and automate processes for beneficial outcomes, it also comes with an equal number of risks to data protection, cybersecurity, and other ethical concerns, according to iProov. Digital ecosystems continue to grow and multiply at

React to this headline:

Loading spinner

Cybercriminals get productivity boost with AI Read More »

Demystifying SOC-as-a-Service (SOCaaS)

Demystifying SOC-as-a-Service (SOCaaS) 2024-02-07 at 06:31 By Help Net Security Threat actors aren’t looking for companies of specific sizes or industries, they are looking for opportunities. Given that many companies operate in the dark and overlook breaches until ransomware attacks occur, this makes the threat actors’ job easy. It also underscores the urgency for proactive

React to this headline:

Loading spinner

Demystifying SOC-as-a-Service (SOCaaS) Read More »

Malicious logins from suspicious infrastructure fuel identity-based incidents

Malicious logins from suspicious infrastructure fuel identity-based incidents 2024-02-02 at 06:01 By Help Net Security 69% of identity-based incidents involved malicious logins from suspicious infrastructure, which are hosting providers or proxies that aren’t expected for a user or organization, according to Expel. Identity-based incidents accounted for 64% of all incidents investigated by the Expel SOC,

React to this headline:

Loading spinner

Malicious logins from suspicious infrastructure fuel identity-based incidents Read More »

Identity Security Firm Silverfort Lands $116 Million Investment

Identity Security Firm Silverfort Lands $116 Million Investment 2024-01-23 at 15:46 By Ryan Naraine Israeli late-stage startup Silverfort raises a whopping $116 million in new financing to scale its ambitions in the identity security space. The post Identity Security Firm Silverfort Lands $116 Million Investment appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Identity Security Firm Silverfort Lands $116 Million Investment Read More »

Oleria Secures $33M Investment to Grow ID Authentication Business

Oleria Secures $33M Investment to Grow ID Authentication Business 2024-01-18 at 15:31 By Ryan Naraine Seattle identity and authentication startup Oleria has attracted renewed interest from venture capital investors. The post Oleria Secures $33M Investment to Grow ID Authentication Business appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original

React to this headline:

Loading spinner

Oleria Secures $33M Investment to Grow ID Authentication Business Read More »

Delinea Acquires Authomize to Tackle Identity-Based Threats

Delinea Acquires Authomize to Tackle Identity-Based Threats 2024-01-09 at 21:02 By Ryan Naraine Delinea acquires Israeli startup Authomize to add identity threat detection and response (IDTR) technologies to its product portfolio. The post Delinea Acquires Authomize to Tackle Identity-Based Threats appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original

React to this headline:

Loading spinner

Delinea Acquires Authomize to Tackle Identity-Based Threats Read More »

The growing challenge of cyber risk in the age of synthetic media

The growing challenge of cyber risk in the age of synthetic media 2024-01-09 at 07:01 By Help Net Security As AI tools become more widespread, impersonation and deception have become easier. However, organizations are combating this issue with policies and technological solutions. In this Help Net Security video, Mike Bechtel, Chief Futurist at Deloitte, discusses

React to this headline:

Loading spinner

The growing challenge of cyber risk in the age of synthetic media Read More »

Verification roadblocks cause frustration for digital nomads

Verification roadblocks cause frustration for digital nomads 2023-12-26 at 06:36 By Help Net Security Digital nomads are expressing the most frustration when interacting with organizations offering services in the United States, according to Regula. This revelation comes as a surprise, given that the United States was the most frequented destination for the digital nomad community

React to this headline:

Loading spinner

Verification roadblocks cause frustration for digital nomads Read More »

Rising fintech trends for 2024: From A2A payments to GenAI in banking

Rising fintech trends for 2024: From A2A payments to GenAI in banking 2023-12-26 at 06:02 By Help Net Security The fintech market is undergoing a rapid shift, with the rise of new technologies, such as Open Finance, generative AI and A2A (Account-to-Account) payments having a major impact on business models, according to Juniper Research. This

React to this headline:

Loading spinner

Rising fintech trends for 2024: From A2A payments to GenAI in banking Read More »

Opal Security Scores $22M Investment for IAM Technology

Opal Security Scores $22M Investment for IAM Technology 08/12/2023 at 21:46 By Ryan Naraine San Francisco startup gets fresh capital from Battery Ventures to compete in the crowded identity and access management space. The post Opal Security Scores $22M Investment for IAM Technology appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

Opal Security Scores $22M Investment for IAM Technology Read More »

Strategies for cultivating a supportive culture in zero-trust adoption

Strategies for cultivating a supportive culture in zero-trust adoption 29/11/2023 at 08:01 By Mirko Zorz In this Help Net Security interview, Wolfgang Goerlich, Advisory CISO at Cisco, discusses the benefits of implementing a mature zero-trust model for both security and business outcomes, revealing a decrease in reported security incidents and enhanced adaptability. Goerlich emphasizes the

React to this headline:

Loading spinner

Strategies for cultivating a supportive culture in zero-trust adoption Read More »

Scroll to Top