Thursday, July 19, 2018

Review: Predictively locking down security with Balbix

If cybersecurity defenders could accurately predict when and how future attacks against their networks would take place, it would be a lot easier for organizations to commit their limited resources where they could do the most good. But there...

IDG Contributor Network: Are network-based security detection tools going dark?

In cybersecurity, there is no shortage of detection tools designed to alert organizations to potential threats.  To over-simplify things, you can broadly categorize these into two camps (although there are others):  Endpoint Detection tools, and Network Detection tools. Each...

BrandPost: No More Excuses for Leaving Legacy and Custom Apps Unprotected

When you have custom or legacy applications that don’t support standard authentication protocols, it can feel like you’re facing an impossible choice: Keep the apps you depend on, or keep your organization secure. Maybe you’d like to add another...

Microsoft’s Identity Bug Bounty program pays up to $100,000

Microsoft launched a new bug bounty program specifically aimed at identity services with bounty payouts ranging from $500 to $100,000.Microsoft’s Identity Bounty program will reward researchers for finding eligible bugs in not only its identity solutions, but also for...

Microsoft’s bug bounty program for flaws in identity services payouts up to $100,000

Microsoft launched a new bug bounty program specifically aimed at identity services with bounty payouts ranging from $500 to $100,000.Microsoft’s Identity Bounty program will reward researchers for finding eligible bugs in not only its identity solutions but also for...

IDG Contributor Network: How citizen ownership of data impacts business going forward

What a wild last few weeks it has been for the state of California. The California Consumer Privacy Act of 2018 (CCPA) is California’s response to the privacy standard set by the GDPR. It should have been expected from...

IDG Contributor Network: N-dimensional behavioral biometrics: a viable solution for digital fraud?

Identity fraud is expected to reach an all-time high in 2018. Javelin Research Center reported a record 16.7 million consumers fell victim last year, in large part due to the massive Equifax breach which left millions of consumers’ data...

6 essential elements of edge computing security

In 2017, a thermometer in a fish tank at a casino hotel lobby was hacked, enabling attackers to penetrate the casino’s network and transport its “high roller” database to the cloud.To read this article in full, please click here(Insider...

What is single sign-on? How SSO improves security and the user experience

Single sign-on (SSO) is a centralized session and user authentication service in which one set of login credentials can be used to access multiple applications. Its beauty is in its simplicity; the service authenticates you one on one designated...

BrandPost: How Cloud Migration Impacts Network Infrastructure

The Cloud ImperativeEnterprise IT is increasingly a multi-cloud affair. With Gartner projecting that 85 percent of enterprises are currently using a multi-cloud strategy, it seems difficult to find an enterprise that doesn’t. IT leaders are like conductors – orchestrating...

IDG Contributor Network: 8 steps to secure unmanaged devices in the enterprise

For many years now, enterprise networks have seen a steady stream of new devices that are outside of IT department control. The mobility trend has given way to the rise of the IoT and the result is a lot...

Walmart teamed up with Microsoft to take on their rival Amazon

Walmart teamed up with Microsoft to take on their rival Amazon. Walmart, Amazon’s largest retail rival, has pledged to use Amazon Web Services competitor Azure as well as tap into Microsoft’s AI and machine learning projects. Microsoft Chief Satya...

IDG Contributor Network: DAM if you do and DAM if you don’t

Digital Asset Management or DAM is traditionally associated with rich media and the companies who employ that type of content, such as media and entertainment. It is big business too. The market for DAM is expected to be worth...

5 tips for getting started with DevSecOps

At an increasing number of organizations, software development has been undergoing waves of change: First agile development, then DevOps and now secure DevOps, a.k.a. DevSecOps. The net gain is better quality applications that aren't moonshots in their first iterations;...

Analyzing user behavior to stop fake accounts

Last week, I talked about the future of user authentication, in particular continuous and seamless user authentication as the way to fight logon and transaction fraud. I mentioned that many companies, including credit card processors, had been doing something...

IDG Contributor Network: Redefining threat prediction

While the definition of “prediction” might seem like an obvious concept, in the context of security I’ve found that most people’s expectations seldom align with reality. You can blame pop culture if you like. Some misunderstandings surrounding prediction come...

IDG Contributor Network: Lack of confidence in data security can cost you more than you think

The European Union's General Data Protection Regulation (GDPR) came into effect almost two months ago. Leading the way to a new era of data protection, the long-awaited GDPR has emphasized the importance of data security more than ever before....

IDG Contributor Network: HTML5: a devil in disguise

In today’s digital age, online users have become much more demanding about the quality of the websites or applications they are using. They have come to expect an optimized user experience as a basic requirement and HTML5 has played...

IDG Contributor Network: What CAPTCHAs can teach us about authentication

CAPTCHAs (short for Completely Automated Public Turing test to tell Computers and Humans Apart) help to prevent the creation of fake accounts, content scraping and other malicious activity. They’re designed to verify users’ humanity, not their identities. But much...

IoT search engine ZoomEye cached passwords for tens of thousands of Dahua DVRs

When it comes to the internet of extremely insecure things, it’s not a good sign when a security researcher warns that “a new low has been achieved in the ease of hacking IoT devices.”That ease of hacking to which...

Privacy Advocates Say Kelsey Smith Act Gives Police Too Much Power

This bill making its way through Congress would allow law enforcement to more easily uncover location data for cell phones from mobile carriers in an emergency.

Financial Industry Insiders Put the Keys to the Kingdom at Risk

Monitoring for Illicit Insider Activity Shouldn’t Focus Exclusively on Dark Web and Criminal Forums read more

Trends in malware – ransomware, cryptojacking, what next? [PODCAST]

Catch up with Day 3 of our Security SOS Week - here's the third episode of our week-long online security summit.

Microsoft offers up to $100,000 to identity bug finders

Want to earn $100,000? You could win as much as that if you manage to uncover a serious vulnerability in Microsoft’s various identity services. Read more in my article on the Hot for Security blog.

Automated money-laundering scheme found in free-to-play games

The scammers automatically created iOS accounts with valid email accounts, then automatically used stolen cards to buy and resell stuff.