Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Digital Identity

Just-In-Time Privilege Elevation: A least-privilege solution to protect your AD-connected business

One Identity Just-In-Time Privilege automatically assigns privileges at the time of a credential check-out – and immediately removes privileged access and resets the account password when task is completed. This protects your Active Directory from bad actors and potential breach.

The Ultimate Guide to SaaS User Onboarding

User onboarding, in particular for SaaS organisations, may raise the bar for your product. More sales may result straight from onboarding. So, encouraging new users to stay is essential. Additionally, the best way to build a community around your SaaS offering is through satisfied customers. These two factors are the precise reasons why the initial few client contacts must be successful.

Embracing Biometric Identity Verification: A Look at Belgium and Kuwait Telecoms

Belgium: The country’s telecom authority has given a telco in Belgium , which is the largest cable broadband service provider, permission to utilise facial biometrics for remote identity verification. According to the Belgian Institute for Postal Services and Telecommunications (BIPT), the telecom operator responded to an email with clarifications on how the implementation of biometrics fits within the nation’s electronic communications framework.

CrowdStrike Extends Identity Security Innovations to Protect Customers and Stop Breaches

From the CISO perspective, identity security is one of the top security challenges, driven by the adversary’s increased use of stolen credentials to target and infiltrate organizations. The data bears this out: according to the CrowdStrike 2023 Global Threat Report, 80% of attacks use compromised identities, while advertisements for access broker services jumped 112% in 2022.

The Benefits and Risks of Using Government Databases for ID Verification in Fraud Prevention

In today’s digital world, identity theft and fraud have become increasingly common occurrences. It is no secret that fraudsters are getting more creative, making it more challenging for businesses and individuals to protect themselves. However, with the advent of technology, there are various ways to mitigate these risks, such as using government databases for ID verification.

Protect Passwords, Don't Just Manage Them: A Game Plan for CIOs and CISOs

When 921 password attacks occur per second, it’s time to treat everyday employees’ credentials like the true operational risk they are. Today’s attackers assign a level of value to employees’ passwords they once reserved for privileged users’ credentials. Why? Workers now have a shocking amount of access to sensitive resources. I’ll elaborate… but through the perspective of a chief information officer kept up at night by risks.

What Is Zero Trust and Why Is it So Important?

You’ve heard about it. A lot. But there are quite a few nuances when it comes to how Zero Trust security is defined and discussed. Is it a platform or a principle? It’s one of those terms that’s so widely cited that it has the tendency these days to elicit eye rolls within the cybersecurity industry and to be referred to as a buzzword by those sitting at the cool kids’ lunch table.

The Ultimate Guide to KYC in Crypto: Everything You Need to Know

The first step in Anti-Money Laundering (AML) due diligence is to Know Your Customer (KYC). A financial institution (FI) promptly implements KYC processes to identify and confirm a new customer’s identification. These procedures enable FIs to evaluate the risk profile of a customer based on that person’s propensity for financial crime. KYC is a procedure that cryptocurrency exchanges are required to follow.

EP 23 - From Delivering Mail to Delivering Zero Trust: A CSO's Cyber Journey

Today’s guest is Den Jones, who’s Chief Security Officer (CSO) at Banyan Security, a startup Zero Trust network access solution (and a CyberArk technology partner). Jones spent almost 19 years at Adobe, followed by a stop at Cisco, before landing at Banyan in 2021. As his Twitter bio tells it, he’s a “Large Scale Zero Trust Deliverer,” which is part of his multifaceted CSO charge.

India Implements AML Standards on Crypto Exchanges, Focusing on Transaction Accountability

India has recently implemented Anti-Money Laundering (AML) standards on cryptocurrency and crypto exchange platforms, specifically focusing on transaction accountability. This move comes as India aims to regulate and monitor the rapidly growing cryptocurrency and crypto exchange industry, which has been a topic of controversy due to its association with illegal activities such as money laundering and terrorism financing.