Advertisement

Why Small Data Breaches Are a Big Threat to Cybersecurity

Over the last year, a series of high-profile cyber attacks caught the attention of media, national governments, and the broader public. Spectacular data breaches like those that affected Colonial Pipeline, JBS, and SolarWinds can have dramatic consequences for the victims, ranging from ransomware payments to significant reputational damage. As a result, it’s no surprise that many organizations design their […]

Prioritizing Cybersecurity at the Leadership Level

Week after week, month after month, shareholder cyber lawsuits hit the news. Capital One settles for $190 million. A class-action lawsuit was filed against Ultimate Kronos Group for alleged negligence regarding a ransomware attack, identifying a poor cybersecurity system as the root problem. These two news items in recent months underscore the risks companies face in their ongoing war […]

Identity Management Day Is More Relevant Than Ever

Employees are leaving their jobs at unprecedented rates amid what many are calling the Great Resignation. While resulting labor shortages appear to be the most immediate issue to address, beneath the surface is another urgent challenge for business leaders: securely onboarding and offboarding employees.  Many of today’s offboarding processes allow former employees continued access to […]

2022 Predictions: Data Privacy, API Attacks, and Embedded Finance

The second year of the pandemic, 2021 was an eventful one, as new security threats emerged and technological breakthroughs were made. Looking to 2022, IT and security professionals must be prepared for whatever comes next – from advancements in embedded finance to mounting consumer data privacy concerns to data breaches due to leaky APIs.   Embedded Finance Will Revolutionize the Technology Industry Over the […]

A New Era of Risk: Data Security Through Modern Authentication Technologies

IT professionals are still struggling to manage the risks brought about by remote work with their existing data security tools. Remote access went from being considered a workplace exception to the default model for large swaths of employees seemingly overnight. However, the considerable strain remote access puts on information security environments continues to be felt.  […]

Vendor Onboarding and Offboarding: Are You Doing It the Right Way?

Insecure and mismanaged third parties like vendors, cloud companies providing software applications or infrastructure, and supply chain partners are directly correlated with many data breaches and hacks. In fact, recent research revealed that 59% of data breaches were related to a third party.  Amongst all, one of the most crucial aspects of managing third-party risk is having good onboarding processes […]