News & Commentary

Latest Content tagged with Identity & Access Management
Page 1 / 2   >   >>
A Data Protection Officer's Guide to the GDPR Galaxy
Commentary  |  3/19/2018
Impending deadline got you freaking out? These five tips might help you calm down, at least a little.
Voice-Operated Devices, Enterprise Security & the 'Big Truck' Attack
Commentary  |  3/15/2018
The problem with having smart speakers and digital assistants in the workplace is akin to having a secure computer inside your office while its wireless keyboard is left outside for everyone to use.
Segmentation: The Neglected (Yet Essential) Control
Commentary  |  3/14/2018
Failure to deploy measures to contain unauthorized intruders is a recipe for digital disaster.
IoT Product Safety: If It Appears Too Good to Be True, It Probably Is
Commentary  |  3/12/2018
Proposed new connected-product repair laws will provide hackers with more tools to make our lives less secure.
DevSecOps: The Importance of Building Security from the Beginning
Commentary  |  3/9/2018
Here are four important areas to tackle in order to master DevSecOps: code, privacy, predictability, and people.
Privilege Abuse Attacks: 4 Common Scenarios
Commentary  |  3/7/2018
It doesn't matter if the threat comes from a disgruntled ex-employee or an insider anticipating financial gain, privilege abuse patterns are pretty much the same, and they're easy to avoid.
Identity Management: Where It Stands, Where It's Going
News  |  3/6/2018
How companies are changing the approach to identity management as people become increasingly digital.
What Enterprises Can Learn from Medical Device Security
Commentary  |  3/1/2018
In today's cloud-native world, organizations need a highly distributed approach that ties security to the workload itself in order to prevent targeted attacks.
How to Secure 'Permissioned' Blockchains
Commentary  |  2/28/2018
At the heart of every blockchain is a protocol that agrees to the order and security of transactions in the next block. Here's how to maintain the integrity of the chain.
Leveraging Security to Enable Your Business
Commentary  |  2/23/2018
When done right, security doesn't have to be the barrier to employee productivity that many have come to expect. Here's how.
C-Suite Divided Over Security Concerns
News  |  2/21/2018
Survey shows 60% of CEOs plan to invest the most resources in malware prevention, but CISOs, CIOs, and CTOs are on a different page.
IRS Reports Steep Decline in Tax-Related ID Theft
News  |  2/15/2018
Research group Javelin confirms that the numbers are trending in the right direction, with total fraud losses dropping more than 14% to $783 million.
Back to Basics: AI Isn't the Answer to What Ails Us in Cyber
Commentary  |  2/9/2018
The irony behind just about every headline-grabbing data breach we've seen in recent years is that they all could have been prevented with simple cyber hygiene.
20 Signs You Need to Introduce Automation into Security Ops
Commentary  |  2/8/2018
Far too often, organizations approach automation as a solution looking for a problem rather than the other way around.
Identity Fraud Hits All-Time High in 2017
News  |  2/6/2018
Survey reports that the number of fraud victims topped 16 million consumers last year, and much of that crime has moved online.
Lieberman Software Acquired by Bomgar
Quick Hits  |  2/1/2018
Deal combines privileged access management products, technologies.
Google Cloud Least-Privilege Function Goes Live
Quick Hits  |  1/31/2018
Custom Roles for Cloud IAM now available in production from Google.
Passwords: 4 Biometric Tokens and How They Can Be Beaten
Commentary  |  1/31/2018
Authentication security methods are getting better all the time, but they are still not infallible.
K-12 Study Gives Schools Low Marks for Protecting Student Privacy Online
News  |  1/31/2018
Survey says local school districts and education departments lack even the most basic security and privacy safeguards.
6 Tips for Building a Data Privacy Culture
Slideshows  |  1/26/2018
Experts say it's not enough to just post data classification guidelines and revisit the topic once a year. Companies have to build in privacy by design.
New Voice MFA Tool Uses Machine Learning
Quick Hits  |  1/25/2018
Pindrop claims its new multi-factor authentication solution that uses the "Deep Voice" engine could save call centers up to $1 per call.
Facebook Buys Identity Verification Firm
Quick Hits  |  1/25/2018
Facebook has purchased startup Confirm, which uses pattern analysis to confirm identities.
GDPR: Ready or Not, Here It Comes
Commentary  |  1/24/2018
As organizations all over the world look ahead to May 25 when Europe's General Data Protection Regulation takes effect, many will fall short.
One Identity Acquires Balabit
Quick Hits  |  1/17/2018
Union expands One Identity's privileged access management and analytics offerings.
1 in 9 Online Accounts Created in 2017 Was Fraudulent
Quick Hits  |  1/16/2018
Account takeovers hot, stolen credit cards not.
6 Tips to Protect Against Technical Support Fraud
Slideshows  |  12/27/2017
Just when youre having fun over the holidays and not paying attention, you can be hit with a tech support scam. Here's how to stay safe into the new year.
Oracle Product Rollout Underscores Need for Trust in the Cloud
News  |  12/11/2017
Oracle updates its Identity SOC and management cloud with security tools to verify and manage users trusted with access to cloud-based data and applications.
Gartner: IT Security Spending to Reach $96 Billion in 2018
News  |  12/8/2017
Identity access management and security services to drive worldwide spending growth.
We're Still Not Ready for GDPR? What is Wrong With Us?
Commentary  |  11/17/2017
The canary in the coalmine died 12 years ago, the law went into effect 19 months ago, but many organizations still won't be ready for the new privacy regulations when enforcement begins in May.
Who Am I? Best Practices for Next-Gen Authentication
Commentary  |  11/15/2017
By their very nature, antiquated, static identifiers like Social Security numbers and dates of birth are worse than passwords.
Inhospitable: Hospitality & Dinings Worst Breaches in 2017
Slideshows  |  11/8/2017
Hotels and restaurants are in the criminal crosshairs this year.
How Law Firms Can Make Information Security a Higher Priority
Commentary  |  11/8/2017
Lawyers always have been responsible for protecting their clients' information, but that was a lot easier to do when everything was on paper. Here are four best practices to follow.
How I Infiltrated a Fortune 500 Company with Social Engineering
Commentary  |  11/7/2017
Getting into the company proved surprisingly easy during a contest. Find out how to make your company better prepared for real-world attacks.
When Ransomware Strikes: 7 Steps You Can Take Now to Prepare
Commentary  |  11/6/2017
Ransomware is still on the rise. These operational tips can help lessen the blow if you're hit.
10 Mistakes End Users Make That Drive Security Managers Crazy
Slideshows  |  11/2/2017
Here's a list of common, inadvertent missteps end users make that can expose company data.
Will New Ownership Open New Opportunities for Digital Cert Vendors?
News  |  11/1/2017
Francisco Partners acquires majority stake in Comodo CA; DigiCert completes purchase of Symantec's SSL cert business.
Preventing Credential Theft: A Security Checklist for Boards
Commentary  |  10/30/2017
Board members pose a unique risk for business, but proper planning helps.
Why Data Breach Stats Get It Wrong
Commentary  |  10/26/2017
It's not the size of the stolen data dump that is important. It's the window between the date of the breach and the date of discovery that represents the biggest threat.
Advanced Analytics + Frictionless Security: What CISOS Need to Know
Commentary  |  10/25/2017
Advances in analytics technologies promise to make identity management smarter and more transparent to users. But the process is neither straightforward nor easy.
The Week in Crypto: Bad News for SSH, WPA2, RSA & Privacy
News  |  10/20/2017
Between KRACK, ROCA, new threats to SSH keys, and the European Commission's loosey-goosey stance on encryption backdoors, it's been a difficult time for cryptography.
Game Change: Meet the Mach37 Fall Startups
Slideshows  |  10/18/2017
CEOs describe how they think their fledgling ventures will revolutionize user training, privacy, identity management and embedded system security.
Banks Start Broad Use of Blockchain, as JP Morgan, IBM Lead Way
News  |  10/17/2017
Two major players announced cross-border payment networks built on blockchain technologies Monday, and more financial services will follow soon, despite opinions about Bitcoin.
Google Bolsters Security for Select Groups
Quick Hits  |  10/17/2017
Business leaders, political campaign teams, journalists, and other high-risk groups will receive advanced email and account protection.
GDPR Compliance: 5 Early Steps to Get Laggards Going
Slideshows  |  10/16/2017
If you're just getting on the EU General Data Protection Regulation bandwagon, here's where you should begin.
How Systematic Lying Can Improve Your Security
Commentary  |  10/11/2017
No, you don't have to tell websites your mother's actual maiden name.
Why Your Business Must Care about Privacy
Commentary  |  9/26/2017
It might not have something to hide, but it definitely has something to protect.
SecureAuth to Merge with Core Security
News  |  9/20/2017
K1 Investment Management, which owns Core Security, plans to acquire the identity management and authentication company for more than $200 million.
GDPR & the Rise of the Automated Data Protection Officer
Commentary  |  9/19/2017
Can artificial intelligence and machine learning solve the skills shortage as the EU's General Data Protection Regulation deadline approaches?
How Apple's New Facial Recognition Technology Will Change Enterprise Security
Commentary  |  9/19/2017
Expect a trickle-down effect, as tech similar to Face ID becomes offered outside of Apple.
Workplace IoT Puts Companies on Notice for Smarter Security
Commentary  |  9/6/2017
Blacklisting every "thing" in sight and banning connections to the corporate network may sound tempting, but it's not a realistic strategy.
Page 1 / 2   >   >>

Who Does What in Cybersecurity at the C-Level
Steve Zurier, Freelance Writer,  3/16/2018
The Case for Integrating Physical Security & Cybersecurity
Paul Kurtz, CEO & Cofounder, TruSTAR Technology,  3/20/2018
A Look at Cybercrime's Banal Nature
Curtis Franklin Jr., Executive Editor, Technical Content,  3/20/2018
Register for Dark Reading Newsletters
White Papers
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.