SecureAuth and Core Security’s Larry Kraft Named 2018 Channel Chief

SecureAuth and Core Security’s Larry Kraft Named 2018 Channel Chief, Bringing Identity Security Automation to the Channel

Vice President of Global Channels & Alliances Recognized for Third Year in a Row

The Attraction of the Single Tier Approach

The Attraction of the Single Tier Approach

Crowdstrike and SecureAuth are both security vendors and have both recently taken the decision to move away from distribution

One of the most highly populated areas in the market is the security world with established and start-up vendors jostling to be the chosen technology that will help keep customers secure.

The volume of players has put some strain on distribution because it was inundated with potential suppliers and given the task of doing sue diligence on numerous firms claiming to be offering the next big thing.

Security Answers in Plain English: What is a Man-In-The-Middle Attack?

Author: 
Mike Talon | @miketalonync

 

"I heard on the news about how some sites and mobile apps are vulnerable to Man-in-the-Middle attacks.  What is a Man-In-The-Middle Attack, how does it work, and how can I protect myself?"

Man-in-the-Middle (MitM) attacks are basically one website stepping in-between you and a legitimate website so that whatever you do on the legitimate website can be seen and stolen by the attacker who owns the site in the middle.  There are two common ways this happens:

Customer Update on Spectre and Meltdown

Author: 
Chris Sullivan, CISO SecureAuth and Core Security

 

SecureAuth and Core Security have been monitoring the evolving situation with “Meltdown” (CVE-2017-5754) and “Spectre” (CVE-2017-5753 and CVE-2017-5715) – the recently disclosed processor (CPU) vulnerabilities. Our team has not detected any current impact to customer implementations at this time. We have already initiated our standard processes to test and apply patches in our hosting environments per vendor recommendations.

Connected Security Alliance: Stronger Together

Author: 
Christine Mikolajczak

Each year, organizations spend millions of dollars on network and endpoint security, yet breaches continue to happen. Across today’s security vendor landscape, there are hundreds of point products that protect against all points of penetration in the attack lifecycle.

While there is no silver bullet when it comes to infrastructure security, aren’t we stronger together? Shouldn’t security products work together to provide the best protection?

Webinar Presentation Slides: 2018 Cybersecurity Predictions

 

451 Research and SecureAuth+Core Security peek into the emerging trends in cybersecurity and identity in 2018. Learn how these trends will impact your strategy, organization, and job in the coming year. Security experts Garrett Bekker, 451 Research and Chris Sullivan, SecureAuth+Core Security share insight on these trends and more:

Webinar: 2018 Cybersecurity Predictions the Identity Aware Perimeter Comes to the Fore

451 Research and SecureAuth+Core Security peek into the emerging trends in cybersecurity and identity in 2018. Learn how these trends will impact your strategy, organization, and job in the coming year. Security experts Garrett Bekker, 451 Research and Chris Sullivan, SecureAuth+Core Security share insight on these trends and more:

Identity 101: What is Acceptance Fatigue?

Author: 
Mike Talon | @miketalonync

We've all seen it - and most of us have done it, too.  So many alerts, notifications, and pop-ups assault us every day that users are clicking yes just to get rid of them. The blanket term to describe this behavior is "acceptance fatigue", and it has severe repercussions for identity management and security. How did we get to this point of acceptance fatigue and what can be done to stop it? 

Lessons Learned at Gartner Identity and Access Management Summit 2017

Author: 
Jeff Nolan, CMO

 

More than 1,800 delegates from companies around the globe converged last week in Las Vegas for Gartner’s annual Identity and Access Management (IAM) Summit. Gartner IAM is unique in that it is solely focused on identity and access management rather than covering all areas of security. 

The Year Ahead: 2018 Security Preview

Author: 
Stephen Cox

2017 has brought a world of new cyber threats, from sophisticated ransomware attacks to cryptocurrency theft to high-profile data breaches – too often connected to stolen or misused credentials. With the evolution of the cyber threat landscape, c-suite and IT professional decision-makers are realizing that they must think differently about their cybersecurity strategies and methods if they expect to keep their organizations secure.  

In 2018, we expect to see…

Pages