WSJ: Techniques To Avoid Inflaming Breach Communication

 

WSJ: Techniques To Avoid Inflaming Breach Communication

By Kate Fazzini

How corporate security teams talk to each other and to executives during the early stages of a breach can sometimes make the situation worse.

Former CIA Director, John O. Brennan Joins SecureAuth + Core Security Advisory Board

 

Former CIA Director, John O. Brennan Joins SecureAuth + Core Security Advisory Board to Fortify Gaps in Cybersecurity Battle Lines

Leading Expert in National Security to Advise on Market Approach, Product Strategy, and Customer Value for Identity Based Security Automation Solution

SecureAuth and Core Security Create A Visual Revolution in the Identity Governance and Administration Space with New Visual Identity Suite

SecureAuth and Core Security Create A Visual Revolution in the Identity Governance and Administration Space with New Visual Identity Suite

Product release enables users to ‘see’ roles and certifications like never before to decrease security risk, reduce review time, and improve accuracy

How to Make Friends and Find Your Way at RSA 2018

Author: 
SecureAuth
 

Are you hitting the road and heading to RSA 2018 in San Francisco this April? We know this event is huge and it can be a tad bit overwhelming trying to start a conversation with perfect strangers. So we’re here to help. We’ve got some great people on our team and we want you to know them. We even have map of San Francisco showing where we'll be during RSA 2018!

SecureAuth and Core Security’s Larry Kraft Named 2018 Channel Chief

SecureAuth and Core Security’s Larry Kraft Named 2018 Channel Chief, Bringing Identity Security Automation to the Channel

Vice President of Global Channels & Alliances Recognized for Third Year in a Row

The Attraction of the Single Tier Approach

The Attraction of the Single Tier Approach

Crowdstrike and SecureAuth are both security vendors and have both recently taken the decision to move away from distribution

One of the most highly populated areas in the market is the security world with established and start-up vendors jostling to be the chosen technology that will help keep customers secure.

The volume of players has put some strain on distribution because it was inundated with potential suppliers and given the task of doing sue diligence on numerous firms claiming to be offering the next big thing.

Security Answers in Plain English: What is a Man-In-The-Middle Attack?

Author: 
Mike Talon | @miketalonync

 

"I heard on the news about how some sites and mobile apps are vulnerable to Man-in-the-Middle attacks.  What is a Man-In-The-Middle Attack, how does it work, and how can I protect myself?"

Man-in-the-Middle (MitM) attacks are basically one website stepping in-between you and a legitimate website so that whatever you do on the legitimate website can be seen and stolen by the attacker who owns the site in the middle.  There are two common ways this happens:

Customer Update on Spectre and Meltdown

Author: 
Chris Sullivan, CISO SecureAuth and Core Security

 

SecureAuth and Core Security have been monitoring the evolving situation with “Meltdown” (CVE-2017-5754) and “Spectre” (CVE-2017-5753 and CVE-2017-5715) – the recently disclosed processor (CPU) vulnerabilities. Our team has not detected any current impact to customer implementations at this time. We have already initiated our standard processes to test and apply patches in our hosting environments per vendor recommendations.

Connected Security Alliance: Stronger Together

Author: 
Christine Mikolajczak

Each year, organizations spend millions of dollars on network and endpoint security, yet breaches continue to happen. Across today’s security vendor landscape, there are hundreds of point products that protect against all points of penetration in the attack lifecycle.

While there is no silver bullet when it comes to infrastructure security, aren’t we stronger together? Shouldn’t security products work together to provide the best protection?

Pages