Widespread, Brute-Force, Cloud-to-Cloud Attacks Hit Office 365 Users

 

An operationalized cloud-to-cloud brute-force attack against Microsoft Office 365 users has hit high-level employees at multiple Fortune 2,000 organizations.

Security Podcast: Governance and Compliance

 

Information security is often an afterthought in an organisation’s planning and spending. And as a subset of that, Governance, Risk and Compliance (GRC) struggles to get the high-level attention it needs.

In part this stems from the fact that GRC activities have traditionally been spread around various departments and functions within the organisation, with no overall control or strategy.

Authentication and convenience challenges of the retail industry

 

It’s important in all industries to have strong cyber security that is cost efficient to the organisation and provides frictionless user experience. Working with identity and authentication in retail however has some striking differences from that of other industries. In addition to being subject to compliance requirements like PCI, the retail industry has unique challenges as a result of having to manage hundreds to thousands of locations across the globe. Some examples include:

Achieving Stronger Security in Healthcare IT

 

Achieving Stronger Security in Healthcare IT

Ask someone to name the top priority of a healthcare organisation and they’ll probably say “providing excellent patient care.” But if you ask someone to name a second top priority, they might add, “IT security.” Recent breaches like WannaCry ransomware and past examples such as Anthem have turned cyber security into an urgent concern for every healthcare organisation.

The Case for Disclosing Insider Breaches

The Case for Disclosing Insider Breaches 

Too often organizations try to sweep intentional, accidental or negligent employee theft of data under the rug. Here's why they shouldn't. 

What’s an organisation’s biggest silent cybersecurity threat? Insiders

Insiders are a big cybersecurity threat for organisations. SecureAuth detects and protects from breaches with adaptive identity access control

What’s an organisation’s biggest silent cybersecurity threat? Insiders

May 30, 2017 - The largest and most notorious data breaches of our time, such as Yahoo! and Target, are credited to the work of sophisticated cybercriminals. In these cases, attackers infiltrated the system and caused mass chaos among customers, employees investors and others.

Pages