informa
/

Identity & Access Management

Password Reuse Problems Persist Despite Known Risks
The vast majority of users worry about compromised passwords, but two-thirds continue to use the same password or a vari...
September 22, 2021
The vast majority of users worry about compromised passwords, but two-thirds continue to use the same password or a vari...
by Robert Lemos, Contributing Writer
September 22, 2021
4 min read
Article
Data Sharing, Added Security Steps Drive Consumers to Shop Elsewhere
A new survey finds most shoppers will stop a transaction if asked for too much personal information or to complete many ...
September 21, 2021
A new survey finds most shoppers will stop a transaction if asked for too much personal information or to complete many ...
by Dark Reading Staff, Dark Reading
September 21, 2021
1 min read
Article
Grappling With Growth, Employee Needs, and Security Amid a Return to Offices
As organizations strive for a new version of business-as-usual, executives must prepare for challenges around infrastruc...
September 16, 2021
As organizations strive for a new version of business-as-usual, executives must prepare for challenges around infrastruc...
by Shane Buckley, President & Chief Operating Officer, Gigamon
September 16, 2021
5 min read
Article
Security Fears & Remote Work Drive Continued 2FA Adoption
Seventy-nine percent of people used two-factor authentication at least once in 2021, with 72% regularly using the techno...
September 14, 2021
Seventy-nine percent of people used two-factor authentication at least once in 2021, with 72% regularly using the techno...
by Robert Lemos, Contributing Writer
September 14, 2021
4 min read
Article
IAM Stakeholders: The Business Operations Point of View
As the number of identities managed by enterprise skyrockets, organizations are taking steps to better align security an...
September 10, 2021
As the number of identities managed by enterprise skyrockets, organizations are taking steps to better align security an...
by Den Jones, Senior Director of Enterprise Security, Cisco
September 10, 2021
4 min read
Article
OneLogin Automates Advanced Identity Lifecycle Management Processes
New offerings streamline workflows and reduce security risks for onboarding and offboarding.
September 08, 2021
New offerings streamline workflows and reduce security risks for onboarding and offboarding.
September 08, 2021
4 min read
Article
CISA Releases Zero Trust Maturity Model for Public Comment
The maturity model was drafted in June to help federal agencies comply with an executive order and is now ready for feed...
September 07, 2021
The maturity model was drafted in June to help federal agencies comply with an executive order and is now ready for feed...
by Dark Reading Staff, Dark Reading
September 07, 2021
2 min read
Article
CISA and FBI: Be 'Vigilant' About Possible Ransomware Attacks Over Labor Day Weekend
Advisory recommends key defenses for mitigating risk by ransomware and other threats.
August 31, 2021
Advisory recommends key defenses for mitigating risk by ransomware and other threats.
by Kelly Jackson Higgins, Executive Editor
August 31, 2021
4 min read
Article
Microsoft Issues Guidance for Protecting Network Gateways from Mozi IoT Botnet
The Mozi botnet now targets Netgear, Huawei, and ZTE network gateways, Microsoft found.
August 19, 2021
The Mozi botnet now targets Netgear, Huawei, and ZTE network gateways, Microsoft found.
by Dark Reading Staff, Dark Reading
August 19, 2021
1 min read
Article
4 Places Where Digital ID Models Falter
Good digital identity must be secure and unique, verified with high assurance, and privacy-preserving, along with indivi...
August 19, 2021
Good digital identity must be secure and unique, verified with high assurance, and privacy-preserving, along with indivi...
by Aidan McCarty, Co-Founder & Co-CEO, Unum ID
August 19, 2021
5 min read
Article
Zero Trust Is a Great Start; Zero Knowledge Can Be Even Better
For those of us in the decentralized space, the current zero-trust model doesn’t go far enough.
August 11, 2021
For those of us in the decentralized space, the current zero-trust model doesn’t go far enough.
by Ben Golub, Chairman and CEO, Storj
August 11, 2021
5 min read
Article
Cisco Secure Drills Down to Strengthen Biometric Security Options
SPONSORED CONTENT: Dive into passwordless technology and the good and bad of biometrics in this discussion with Cisco Se...
August 09, 2021
SPONSORED CONTENT: Dive into passwordless technology and the good and bad of biometrics in this discussion with Cisco Se...
by Dark Reading Staff, Dark Reading
August 09, 2021
1 min read
Article
Why Supply Chain Attacks Are Destined to Escalate
In his keynote address at Black Hat USA on Wednesday, Matt Tait, chief operating officer at Corellium, called for softwa...
August 05, 2021
In his keynote address at Black Hat USA on Wednesday, Matt Tait, chief operating officer at Corellium, called for softwa...
by Kelly Jackson Higgins, Executive Editor
August 05, 2021
4 min read
Article
5 Key Lessons From ICS Attacks Through the Ages
Industrial control systems attacks are happening with more frequency, but they are hardly new.
August 04, 2021
Industrial control systems attacks are happening with more frequency, but they are hardly new.
by Corey Nachreiner, Chief Security Officer, WatchGuard Technologies
August 04, 2021
5 min read
Article
How Adversaries Still Target Microsoft Active Directory 20 Years Later
Attack paths allow adversaries to reliably take control of nearly every Active Directory in the world.
July 29, 2021
Attack paths allow adversaries to reliably take control of nearly every Active Directory in the world.
by Andy Robbins, Technical Architect, SpecterOps
July 29, 2021
6 min read
Article