Cybersecurity threats are prevalent in the financial sector. In 2024, finance and insurance was the second-most vulnerable industry to cyberattacks. This sector was involved in about 19% of global attacks, preceded by manufacturing at nearly 25%. Banks and other financial organizations manage and store large amounts of client and monetary data. Naturally, this makes them…
Archives
-
Privileged Identity Sprawls: Best Practices for Protecting the Enterprise Crown Jewels
In the latest white paper from our member company, ARCON, you can see that the privileged access management environment is expanding at a rapid pace. This is in tandem with large-scale automation drives, cloud-first initiatives, and digitalization strategies, resulting in identity sprawls across hybrid enterprise IT (Information Technology) environments. Against this backdrop, human…
-
You Have a Standing Privilege Problem and Just Don’t Know It
The year has just begun and as with previous years, many worrying strains of destructive malware have yet again been detected. Unlike ransomware, where you at least have a chance of recovering your data after paying the ransom, the new destructive techniques pose a very real and serious threat to businesses. The recently reported HermeticWiper…
-
Identity-Centric Security: 10 Data Points from 10 Different Vendors (and a book) Make the Case
There’s almost universal consensus that perimeter-centric security is insufficient for today’s distributed IT environments. But where debate amongst IT pros and vendors now rages is whether the optimal enterprise security approach today is application-centric, data-centric, or identity-centric. Data-centric and application-centric approaches have merit, but each can be undermined simply by the wrong identity accessing data,…
-
Zero Trust Myth Series: Leveraging Risk Analysis to Enhance Trust
Trust is a foundational part of personal relationships, and it is a foundational part of the digital relationships between employees, their devices, and the enterprise. However, the sad fact facing security professionals is that there are some insiders – whether they are disgruntled employees or external threat actors acting as legit users that penetrated the…