When a large oil company moved to the US from Canada, they also embarked on an IAM modernization
and integration project. Because their business model included future M&As, the goal was to create a
foundation to support integration of business entities with disparate identity infrastructures so that they
could...
The findings from a penetration test can help you identify risks and gaps in your security controls. Charles Gillman offers tips to maximize the value of your next pen test and, in the process, deliver better results.
Look to Okta to help your agency comply with the Executive Order on Cybersecurity.
For agencies who need to meet the Executive Order on Cybersecurity requirements, the Okta Identity Platform delivers the security, automation, scalability, and integrations necessary to implement an identity-centric Zero Trust...
As the universe of sophisticated cyber threats, such as ransomware, continues to grow in volume and effectiveness, organisations in every industry are moving from a threat prevention strategy to a cyber resilience model for holistic cyber security.
Organisations acknowledge that while blocking threats is still a...
How does one begin to secure the digital transformation journey in two legacy enterprises? Kush Sharma, principal for Sharma and Company and former CISO for the city of Toronto, shares his experience and offers advice on investing in and integrating technologies.
Thought leadership is crucial within the threat intelligence sharing community and developing technologies that easily share and use threat intelligence, as a nation we can help agencies identify and stop attacks aggressively and quickly.
During the podcast, you can anticipate a healthy discussion on:
The value of...
Many employees are likely to begin looking for the flexibility and ease that remote work offers even as the pandemic wanes, turning many previously in-person government workplaces into hybrid ones.
As agencies begin to support a more permanent remote future, it’s critical that they build security in every step of...
Some 3,813 breaches were reported in the first half of 2019 alone, amounting to the exposure of over 4.1 billion records, a year-on-year increase of 54% and 52% respectively.The rise in data breach volumes is undoubtedly due in part to escalating threat activity.
The challenge for organizations is in securing data...
Join our discussions as we talk with cyber industry experts and leaders about the various elements of the WHEO and how we can collectively work to elevate our nation’s cybersecurity posture.
This inaugural Omdia Universe report from Informa Tech, the company behind Black Hat and Dark Reading, offers an independent, comprehensive, end-to-end assessment of world-leading global IT security service providers across two major IT security dimensions: end-to-end service capability and customer experience, and...
Zero Trust is rapidly becoming the security model of choice for enterprises and governments alike. However, security leaders often don't know where to begin to implement it, or they feel daunted by the fundamental shifts in strategy and architecture Zero Trust demands. However, Zero Trust does not require that you rip...
Cybersecurity risks for learning institutions are significant and growing.
Colleges and universities still represent a significant target sector for malicious cyber activity.
Threat actors are focusing a lot on Active Directory today as it is a path for them to reach an organisations key data & applications. The versatility of Active Directory makes it a crucial target for hackers. Organisations learn new ways on how to protect this valuable target and mitigate the risks. Organisations...
According to a Threat Landscape Trends report for Q2 2020, cryptojacking saw a 163% increase in detections, compared to previous quarters. 35% of organizations indicated in a survey by NinjaRMM, that ransomware attacks resulted in up to $5 million in damages. Similarly we see an explosion in DDoS attacks. In times...
Applications, the network, security - they all have been affected by the seismic changes of the past year, and they drive the need for adopting the "zero trust" model. Zscaler CEO Jay Chaudhry and Nexteer Automotive CISO Arun DeSouza discuss the necessary mindset shift.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing securityintelligence.inforisktoday.com, you agree to our use of cookies.