In the late 1990s, exploitable vulnerabilities began to traverse the young Internet, proving that poorly coded and tested software could be exploited for fun, financial gain, and the exfiltration of sensitive information. In order to detect these software flaws, vendors like eEye, ISS, and Nessus began creating vulnerability scanners to identify operating systems and software…
Archives
-
Going Beyond Identity: Why Identity Security is No Longer Just an IAM Problem
In today’s digital landscape, identity security has significantly evolved, expanding beyond the traditional capabilities of identity and access management and aligning more with cybersecurity strategies. Threat actors have also developed and capitalized on this evolution, leveraging identity and privilege as the most common means to breach an organization and cause disruption. They exploit every identity—human…
-
Ask the Cybersecurity Experts: Why the Success of Modern Cyber Defense Hinges on Identity Security
This article was original published by BeyondTrust. You can view the article here. An interview with cybersecurity experts from BeyondTrust: Janine Seebeck, Chief Executive Officer; Morey J. Haber, Chief Security Advisor; James Maude, Director of Research; Brad Call, Information Security Engineer; and Angela Duggan, Vice President of User Experience. Today is Identity Management Day (IMD), a day for raising…
-
Why Identity Security Should Be the Basis of Modern Cybersecurity
This article was originally published by BeyondTrust. You can view the article here. An Interview with the Authors of the latest book in the Attack Vector series, Morey J. Haber, Chief Security Advisor, BeyondTrust, and Darran Rolls, Identity, Security, Privacy & Compliance Advocate. It is easier for a threat actor to log in versus hack…
-
Workforce Identity Security Best Practices: The Essential Role of Unified Identity Protection
This article was originally published by BeyondTrust. You can view the article here. In any corporate environment, every worker needs access to multiple systems from day one (Active Directory, Okta, HR applications, Salesforce, finance tools—the list goes on and on). Those already numerous accounts—and privileges—then accumulate over time (privilege creep) as that employee changes roles…
-
NIST Cybersecurity Framework 2.0 – What’s New & What You Need to Know
This article was originally published by BeyondTrust. You can view the article here. Last week, NIST released Version 2.0 of the widely used Cybersecurity Framework (CSF), its landmark guidance document for reducing cybersecurity risk. The NIST Cybersecurity Framework 2.0 has emerged not just as an update, but also as a transformative approach to securing digital assets and…