Tag: Cybersecurity

Integration Is Key to Maximizing the Value of Cybersecurity Investments

CIL
According to a recent survey of compliance decision makers conducted by research firm Vanson Bourne, every organization knows it needs to invest in cybersecurity tools. However, most organizations are having trouble determining where to allocate their security budget as the IT environment rapidly evolves. Not only that, but organizations aren’t doing enough to integrate their security solutions into a...

How CyberArk’s Conjur Helps Secure DevOps and Cloud-Native Environments

Conjur
According to Forrester Research, at least half of IT organizations are currently using DevOps to increase the speed and efficiency of application development and deployment. Due to the dynamic nature of DevOps, privileged account credentials, encryption keys, and other “secrets” are rapidly proliferating throughout the IT infrastructure. Many of these secrets are stored in code repositories and cloud environments...

The Critical Importance of Managing Business Partner Security Risks

Partner Security
It is well known that the 2013 Target data breach was the result of a compromised third-party vendor. Attackers sent a phishing email to a refrigeration company that did business with Target and had access to some of Target’s computer systems. At least one user fell for the phishing email, causing malware to be installed on the company’s systems....

Mature Identity Management Processes Equate to Reduced Security Risk

Clango
Identity and access management (IAM) is often approached tactically, as a means of giving users access to resources while minimizing IT operational overhead. The threat mitigation and risk management aspects of IAM are not prioritized, leaving gaps in the organization’s security strategy. Cybersecurity spending, which IDC says will reach $81.7 billion this year, remains heavily weighted toward network security...

The Benefits and Potential Pitfalls of IT Self-Service

Clango
Organizations are increasing their use of self-service tools to streamline help desk operations. Most IT self-service tools focus on the automation of manual processes related to password resets and other common identity management tasks. Given that approximately 80 percent of all help desk calls are related to password resets, self-service reduces the strain on the help desk and the...

Why EAM and ERP Should Work Hand in Hand

Clango
For many years, a debate has raged regarding the relative merits of enterprise resource planning (ERP) and enterprise asset management (EAM) systems. Typically, this debate pits an organization’s finance department against its operational teams, with IT stuck somewhere in the middle. Finance might argue that ERP is critical to the business, and ERP modules can provide some EAM functions;...

OAuth Is Convenient, But Is It Secure?

Clango
Earlier this year, a phishing attack targeting Google Docs abused OAuth to give hackers full access to victims’ Gmail accounts and contacts. Google blocked the attack within about an hour, but it might have affected as many as a million Gmail users. Here’s how it worked. The attackers got access to Google’s OAuth APIs by posing as legitimate third-party...

Federated Identity Management: More than Single Sign-On

Clango
In a previous post, we discussed how lax password management is putting organizations at risk. A recent Ovum study found that most organizations rely on employee education and self-monitoring to ensure the use of strong passwords. Few organizations have automated tools for password management, creating a burden on employees and help desk personnel. Identity and access management (IAM) technology...

Identity Management Becoming Key to Mobile Security

Clango
Workers today spend more than a third of their time away from their desks, leveraging a mix of mobile devices and applications to access and share information and collaborate with others. While mobile devices give us unprecedented connectivity options, they also create significant security challenges. In a survey of 4,500 business users, the research firm Ovum found that 70...

How to Boost Security by Gaining Greater Control over Passwords

Clango
Most organizations recognize the dangers posed by weak passwords and have implemented policies requiring users to follow password best practices. Enforcing those policies can be a challenge, however. Faced with a mind-boggling number of passwords to remember, users tend to use the same credentials for most or all applications, or simplify passwords to the point that they’re easy to...