Palo Alto Network’s incident response firm said identity-based attacks are exploding as poor security controls stretch across a widening mosaic of integrated tools and systems.
As identity sprawl grows, Optiv + ClearShark’s Michael Saintcross says cybersecurity leaders must pivot from traditional ICAM strategies to solutions that offer granular control and "zero standing…
FIDO2 authentication standards are great for streamlining the user experience, but CISOs still need PKI to manage machine identity and trusted interactions across the enterprise.
Renata Spinks speaks Jan. 28, 2020, at the Zero Trust Security Summit presented by Duo Security and produced by FedScoop and CyberScoop. (Scoop News Group)
The CIA hacking tools called Gyrfalcon and BothanSpy, as described in documents released by anti-secrecy group WikiLeaks, are "effective, but surprisingly unsophisticated," according to Tatu Ylonen.