Cybercrime gang Scattered Spider is the top suspect in several recent cyberattacks in the U.S. insurance sector, and it's likely that threat actors could still be lurking in other insurers' IT environments, said Peter McMurtrie of consulting firm West Monroe.
Workforce authentication is at a crossroads. Passwords remain the most widely used authentication method, yet they are also a leading cause of security breaches, contributing to at least 87% of attacks perpetrated by external threat actors. This weak link can—and does— fail often, whether passwords are...
Address the critical challenges of endpoint security with a comprehensive preventative identity-centric approach that tackles the removal of local administrative rights, detection of identity-based threats, and visibility into credential misuse. This whitepaper explores how to: Enhance your cybersecurity strategy to...
In high-stakes M&A transitions, access is everything. Whether you're acquiring a new business, merging two giants, or modernizing legacy systems, privileged access can become your strongest shield - or your weakest link. The risks are real: fracture identity systems, compliance blind spots, and unmonitored admin...
Passwords continue to create friction for users and risk for security teams, even as many organizations begin moving toward more modern access models. In this session, we’ll talk through what it really takes to reduce password reliance, how threats are evolving beyond the login screen, and what practical steps...
Our SOC has seen all kinds of real-world incidents: a hacker breaks into a logistics company via exposed RDP; a physician’s stolen credentials are used to log in from a shady workstation and snake through a network; an attacker sets up sneaky inbox rules to maintain access from a phished user. Are these...
Private equity firm Haveli has purchased a majority stake in AppViewX to scale globally, targeting automation in certificate lifecycle management and public key infrastructure. CEO Gregory Webb says the acquisition will fund international expansion and next-gen technology investments.
Traditional authentication methods aren’t working. With the availability of cheap cloud GPUs to crack passwords and tens of billions of known accounts/passwords, it’s clear that passwords aren’t secure. Check out this whitepaper where ESG surveyed 377 IT, cybersecurity, and application development...
Despite heavy security investments, banks still struggle with basic security issues such as default passwords, vendor vulnerabilities and social engineering scams. Scott Weinberg, CEO of Neovera, shares a new report that shows banks of all sizes still grapple with these common risks.
According to IBM's 2024 X-Force Threat Intelligence Index, the abuse of valid credentials was the top initial access vector in 2023. With the growing threat of credential theft and session hijacking, cybercriminals are finding new ways to infiltrate organizations of all sizes. In this webinar, we’ll introduce how...
The Irish data regulator fined social media giant Meta 91 million euros after an investigation found the company insecurely stored passwords of millions of European Facebook and Instagram users. A Meta spokesperson said the company identified the problem in 2019 and took "immediate action."
Data warehousing platform Snowflake rolled out default MFA - as well as a 14-character password minimum - to shore up security in the wake of a series of cyberattacks in June that hit high-profile customers including Santander Bank, Advance Auto Parts, LA Unified School District and Neiman Marcus.
Authentication requiring stored credentials is not only vulnerable to phishing and other compromises, but using these credentials can also be cumbersome for busy clinicians, said Tina Srivastava, co-founder of Badge, a provider of deviceless, tokenless authentication technology.
Does anyone like passwords? They’re a constant point of frustration for customers and businesses - often being cited as the cause of lower conversion rates and security. So that’s why at Okta, we think there’s a better way. We believe passkeys are a viable, phishing-resistant alternative to passwords. And...
The Department of Health and Human Services is facing some of the same cloud security problems as the healthcare organizations it regulates: weaknesses in a dozen different cloud security controls and inventories of cloud systems, according to an inspector general's audit report.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.