Protecting Email from Cyberattack: Insights from the M-Trends 2017 Report

Author: 
Brian Bowden

 

Last year I wrote an article discussing recommendations from the Mandiant/FireEye M-Trend’s 2016 report.  I thought it only prudent to discuss the 2017 report as well; however, this year’s look will focus on one key area of the report, “email”. 

Evidence.com Integration Guide

This guide provides a brief overview of how to integrate SecureAuth IdP with the Evidence.com database management platform. Many law enforcement organizations use Evidence.com to manage and maintain their evidence. In order to make this evidence database as secure as possible, SecureAuth IdP has developed a software bridge that enables secure authentication between the department’s computers and Evidence.com’s resources.

Gartner Magic Quadrant for Access Management


CLICK TO READ FULL REPORT


 

Gartner's 2017 Magic Quadrant for Access Management

Access management (AM) applies to technologies that use access control engines to provide centralized authentication, single sign-on (SSO), session management and authorization enforcement for target applications in multiple use cases.

Securing Office 365: How Adaptive Access Control Protects the World’s Top Cloud App

Author: 
SecureAuth

 

Office 365 has been steadily gaining popularity with over 85 million users of the cloud-based suite worldwide – on pace to exceed 100 million in 2017. But this increased popularity makes Office 365 a prime target for cyber attackers. We know that basic two-factor authentication is not enough to stop a sophisticated attackers and that certain 2FA authentication methods can be easily defeated. Why would you settle for good-enough protection for your most valuable cloud-based data?

Authentication Trends for 2017

Guest speaker Andras Cser, VP and Principal Analyst at Forrester Research, and Stephen Cox, Chief Security Architect at SecureAuth, as they discuss the emerging Identity and Access Management Trends for 2017. Learn how these trends will impact your organization and how you can develop an effective Adaptive Authentication Strategy to stay ahead of the trends and cyber attackers.  
Learn more on these emerging 2017 trends:

Our 2017 Security Predictions

Cybersecurity Predictions on Identity and Access Management
Author: 
Damon Tepe

 

It's that time of year when IT companies all over the world take out their crystal balls and predict oncoming trends for the coming year. What's going to lead adoption? What new security controls will rise to the fore and which ones will fall out of favor? Will this be the year teams solve their most stubborn challenges?

The State of Cybersecurity Survey

Cybersecurity and Adaptive Authentication
Author: 
Damon Tepe

The State of Cybersecurity Survey

Ever notice something about surveys? While there are plenty out there about the threats rising on the IT landscape, there isn't always useful information about the controls and techniques leaders are using to stop them. And that's what we really want to know, right? Finding out where other organizations are struggling and where they're succeeding, and how they're approaching attacks, can provide a roadmap to strengthening your own security program.

Pages