The Latest in IT Security

Posts Tagged ‘Identity management’

The COVID-19 pandemic is far from over, but many companies are signaling that they may never go back to requiring all employees to come to the office each day. The ability to work from anywhere, once just for traveling sales teams and outliers, might become the dominant option for many people. Before this can happen, […]

Read more ...

A supply chain attack, also called a value-chain or third-party attack, occurs when someone infiltrates your system through an outside partner or provider with access to your systems and data. This has dramatically changes the attack surface of the typical enterprise in the past few years, with more suppliers and service providers touching sensitive data […]

Read more ...

Prior to Microsoft’s Ignite conference I was able to talk with the company’s CISO Bret Arsenault about some key elements that we all should be doing to keep Windows networks secure. He talks about four pillars of security: passwordless identity management, patch management, device control and security benchmarks. 1. Passwordless identity management Arsenault’s recommendations start […]

Read more ...


Categories

SATURDAY, APRIL 05, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments