Identity Management

Keeping “IT” Security Real, Re-imagining Cyber Defenses

Much has changed due to Covid-19, Remote Work from Home (or Anywhere) and the ongoing SolarWinds fiasco have caused every cybersecurity team to review “what really matters in terms of cyber risk,” and master the basics as the foundation of their security program. As I have been known to say, in ‘cyber’ what was once true yesterday, may not be so today! It is often recommended to check-in from time-to-time and explore what may have changed. This continues to ring true today. When Covid-19 lockdowns were officially announced in March of 2020, much of the workforce had to rapidly shift to a new mode of working opening or compound existing …

Keeping “IT” Security Real, Re-imagining Cyber Defenses Read More »

Keeping IT Security Real Re-imagining Defenses

Four Myths About Credential Phishing You Can’t Ignore

Four Myths About Credential Phishing You Can’t Ignore When it comes to credential phishing, knowledge is power. We tend to underestimate the impact of phishing on the enterprise and assume our existing defense strategies are sufficient to combat these attacks. To understand phishing means understanding one of the most common methods used by attackers to breach and maneuver within our networks, and to do that we need to dispel a few myths. Read this white paper to learn about phishing tactics and the key steps to building a complete security strategy that protects against credential phishing. Suggested resources for additional research: Analyst Research: IDC Planscape: Deploying Multi-Factor Authentication Customer Journey: Fieldpoint Private …

Four Myths About Credential Phishing You Can’t Ignore Read More »

Four Myths About Credential Phishing You Can’t Ignore

MFA, Deploying Multifactor Authentication

Deploying Multifactor Authentication (MFA) EXECUTIVE SUMMARY Multifactor authentication (MFA) provides organizations with an effective security control that overcomes the weaknesses of knowledge-based authentication and protects network, application, and data assets in an increasingly sophisticated threat environment. By combining passwords with physical devices and/or biometric measurements, organizations add a layer of strong security and protect themselves against password theft. Recent advances in multifactor authentication make this technology more accessible to nontechnical end users and allow widespread deployment throughout the organization. Using multifactor authentication may now be as simple as clicking a button on a pop-up window that appears on the smartphone that a user was already carrying. The simplicity of this …

MFA, Deploying Multifactor Authentication Read More »

Deploying Multifactor Authentication MFA

IDC PlanScape: Deploying Multifactor Authentication

IDC PlanScape: Deploying Multifactor Authentication EXECUTIVE SUMMARY Multifactor authentication provides organizations with an effective security control that overcomes the weaknesses of knowledge-based authentication and protects network, application, and data assets in an increasingly sophisticated threat environment. By combining passwords with physical devices and/or biometric measurements, organizations add a layer of strong security and protect themselves against password theft. Recent advances in multifactor authentication make this technology more accessible to nontechnical end users and allow widespread deployment throughout the organization. Using multifactor authentication may now be as simple as clicking a button on a pop-up window that appears on the smartphone that a user was already carrying. The simplicity of this …

IDC PlanScape: Deploying Multifactor Authentication Read More »

IDC PlanScape Deploying Multifactor Authentication

5 Identity Attacks That Exploit Your Broken Authentication

5 Identity Attacks That Exploit Your Broken Authentication Traditional authentication methods that rely on usernames and password integrity are widely considered to be broken. In fact, “Broken Authentication” sits at #2 in the OWASP Top 10 for application security risks. As organizations begin to move more sensitive data to cloud apps to take advantage of the productivity gains, the traditional perimeter expands to wherever the user is logging in from. In other words, the identity becomes the perimeter. Threat agents have recognized this as a security gap and are exploiting the natural proclivity for your employees to trust an inbound email from a familiar source, or their tendency to reuse …

5 Identity Attacks That Exploit Your Broken Authentication Read More »

5 Identity Attacks That Exploit Your Broken Authentication
Scroll to Top
error: Alert: Content selection is disabled!!