Identity Management
Unlocking the Secrets of Non-Human Identities
Tony Bradley | | Authentication, Blog, Entro Security, non-human identity, Podcasts, Security Awareness
TechSpective Podcast Episode 136 There’s one area that often flies under the radar, yet poses a critical cybersecurity threat to organizations: non-human identities. These programmatic access credentials—like API keys and service ...
Mandatory MFA is Coming to Microsoft Azure
Microsoft is making MFA mandatory for signing into Azure accounts, the latest step in the IT vendor's Secure Future Initiative that it expanded in May in the wake of two embarrassing breaches ...
Security Boulevard
The Essential Guide to Evaluating Competitive Identity Verification Solutions
Amid customer and regulatory pressure and intensifying cyberattacks, organizations must ensure their identity verification strategies match up against AI-powered fraud techniques ...
Security Boulevard
Lawmakers Ask for Probe of Chinese Router Maker TP-Link
Two U.S. lawmakers are asking the Commerce Department to investigate whether the Wi-Fi routers built by Chinese company TP-Link could be used by Chinese-sponsored threat groups to infiltrate U.S. government and private ...
Security Boulevard
Going Passwordless: 6 Tips to Navigate Passkey Adoption
By now, most of us realize that passkeys and passwordless authentication beat passwords in nearly every way — they’re more secure, resist phishing and theft, and eliminate the need to remember and ...
WTH? DPRK WFH Ransomware Redux: 3rd Person Charged
Richi Jennings | | Andrew M., DPRK, Korea, Korean military, Korean ransomware, Matthew Isaac Knoot, North Korea, North Korean Hacking, North Korean Threat Actors, northkorea, Noth Korea, SB Blogwatch
North Korean army of remote IT workers enabled by Matthew Isaac Knoot, alleges DoJ ...
Security Boulevard
DOJ Shuts Down Another North Korean ‘Laptop Farm’
The DOJ shut down another "laptop farm" link to a North Korean fake IT worker scam that the country uses to illegally bring in money for its nuclear and ballistic weapons program ...
Security Boulevard
Overcoming the 5 Biggest Challenges to Implementing Just-in-Time, Just Enough Privilege
Embracing a just-in-time and just-enough privilege approach that harnesses context and automation can remove the tension between security and productivity, enabling teams to run faster without compromising on security standards ...
Security Boulevard
How Situational Awareness Enhances the Security of Your Facility
Situational awareness means what is happening around you, making educated judgments, and responding appropriately to any given scenario. It can be helpful on an individual level and also to organizations for making ...
Security Boulevard
Humans are Top Factor in Cloud Security: CSA Study
A study by the CSA found that the human element continues to play a key role in the top threats facing cloud computing environments, including misconfigurations, IAM, and insecurity interfaces and APIs ...
Security Boulevard