In financial services, there is a stark difference between defending against authorized versus unauthorized fraud incidents. James Hunt of Bottomline Technologies discusses the schemes and how to respond with a more dynamic prevention strategy.
One day after Microsoft disclosed four serious flaws in Microsoft Exchange email servers, attackers are going on a wide hunt for vulnerable machines, some security experts say. The flaws could be exploited for creating backdoors for email accounts or installing ransomware and cryptominers.
The U.S. National Security Agency has issued "zero trust" guidance aimed at securing critical networks and sensitive data within key federal agencies. The NSA adds it is also assisting Defense Department customers with the zero trust implementations.
Asian organizations are beginning to look at extending digital identity beyond the traditional internal enterprise IAM stack to customer identity and access management, or CIAM, says Alex Laurie, senior vice president at ForgeRock.
A newly-discovered phishing campaign posts harvested credentials using the Telegram messaging app's application programming interface to bypass secure email gateways, report researchers at the Cofense Phishing Defense Center.
The Good Health Pass Collaborative is developing a road map for digital health passes that international travelers could use to prove they have been tested for COVID-19. Dakota Gruener, executive director of ID2020, which launched the project, describes the effort, including privacy-protection measures.
This edition of the ISMG Security Report features an analysis of the impact of a hacking campaign linked to Russia’s Sandworm that targeted companies using Centreon IT monitoring software. Also featured: a discussion of CIAM trends; a critique of Bloomberg's update on alleged Supermicro supply chain hack.
A hacker breached a Florida city's water treatment network, increasing the amount of lye that would be added to the water to a dangerous level. Officials say they caught the change immediately and reversed it. Reuters reports that the system was accessed via the city's TeamViewer remote access software.
80% of organizations are resorting to deploying data protection solutions from multiple vendors.
Compared to those working with a single data protection
vendor, on average, organizations using multiple data
protection vendors are likely to experience higher downtime
related costs, higher data
loss costs and are...
As organizations move along the path of digital transformation, enterprise cloud usage continues to evolve as well. While cloud-born applications still need the same data protection workflows as when they were on-premises, the native protection services offered by public
cloud providers often can’t deliver...
Welcome to The Periodic Table of Enterprise Data Protection. It maps the data protection modernization journey of enterprises and serves to explain the complexities of the subject matter in an organized and structural format. It also provides a stark comparison between traditional data protection and the various use...
Organizations continue to embrace digital transformation for both their business and IT groups. The use of public cloud infrastructure has become a key driver for that transformation as organizations are using cloud infrastructure services to mitigate the capital and operational expenses associated with traditional IT...
Cloud Disaster Recovery (Cloud DR) allows customers to efficiently extend Dell EMC data protection for VMware environments to the public cloud, including AWS, Azure and VMware Cloud on AWS.
Using Cloud DR, Dell EMC Data Protection tools can store virtual machines copies over cheap object storage (AWS S3, or Azure...