Key lessons about how the attack happened and can be avoided in the future Even though the SolarWinds happened a couple of years ago, it’s still important today because the vulnerabilities to IT supply chain attacks and insufficient cybersecurity standards that enabled it have still not been resolved across the industry. The devastating supply chain […]
Multi-factor authentication is great, but what happens when hackers go around it? Multi-factor authentication (MFA) is the security standard everyone wants, but despite hopes for it to reduce risk by 90%, hackers bypass MFA regularly. With the determination of Wile E. Coyote, attackers keep InfoSec teams speeding around like Roadrunner, trying to stay ahead of
What can we learn about 2 serious, high-profile MFA bypass and passwordless hacks? There’s a lot of talk whenever serious cyber breaches make the news. Companies assure stakeholders they’ll improve security measures and cybersecurity tech providers promise solutions. Damage control as a result of fear can easily become cybersecurity theater to make people feel safer,
Cybersecurity threats are constantly evolving. From new and rapidly iterating phishing and smishing attacks to shocking instances of biometric MFA bypass, an updated security plan is essential. CISOs have to manage technology and human behavior risk factors, which is a big job. Here are some of the most persistent types of cyber attacks happening right now.
Three of the biggest pain points creating vulnerabilities in identity and access management for internal shared services teams are onboarding, offboarding, and maintenance. When you need to give and remove user access at different organizational levels, maintaining policy management becomes a rat’s nest of complexity. Here’s an overview of the problems in identity and access management and emerging solutions to solve them.