51% of users admit to resetting forgotten passwords once a month
Published on January 19, 2024
via Security Magazine New research from Entrust highlights current shifts in identity management. The Future of Identity report focused on passwordless authentication, hybrid identities and personally identifiable information (PII) ownership. Fifty-one percent of respondents admitted to resetting a password at least once a month because they can’t remember…
Getting off the Attack Surface Hamster Wheel: Identity Can Help
Published on January 10, 2024
Via HackerNews IT professionals have developed a sophisticated understanding of the enterprise attack surface – what it is, how to quantify it and how to manage it. The process is simple: begin by thoroughly assessing the attack surface, encompassing the entire IT environment. Identify all…
90+ Key Password Breach Statistics in 2023
Published on December 11, 2023
via Tech Report Password breaches have become common, a worrying trend today. Cybercriminals devise novel means of accessing people’s accounts and records, which many people do not want to encounter. One password should not be used for multiple accounts. Most people now have multiple passwords…
Cybersecurity Awareness Doesn’t Cut It; It’s Time to Focus on Behavior
Published on December 4, 2023
To borrow a line from social scientists, "abundant research shows that people who are simply given more information are unlikely to change their beliefs or behavior." And yet, here we are again, another Cybersecurity Awareness Month: the industry's Hallmark holiday that promotes spending on cybersecurity training videos, phishing simulators,…
Five Cybersecurity Predictions for 2024
Published on November 29, 2023
via Security Week The year 2023 saw heightened cybersecurity activity, with both security professionals and adversaries engaged in a constant cat-and-mouse game. The dynamic landscape of cyber threats and the ever-expanding digital attack surface have compelled organizations to refine and fortify their security architectures. Despite…
Identity Alone Won’t Save Us: The TSA Paradigm and MGM’s Hack
Published on November 14, 2023
via Dark Reading The recent cyberattack against MGM Resorts grabbed headlines and sent shockwaves across the industry. The hotel and entertainment giant struggled to get systems back online after widespread outages affected several of its landmark Las Vegas properties. In addition to outages of internal networks, the…
NSA and CISA reveal top 10 cybersecurity misconfigurations
Published on November 9, 2023
via Bleeping Computer The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) revealed today the top ten most common cybersecurity misconfigurations discovered by their red and blue teams in the networks of large organizations. Today's advisory also details what tactics, techniques,…
Are You Willing to Pay the High Cost of Compromised Credentials?
Published on October 3, 2023
via The Hacker News Weak password policies leave organizations vulnerable to attacks. But are the standard password complexity requirements enough to secure them? 83% of compromised passwords would satisfy the password complexity and length requirements of compliance standards. That's because bad actors already have access to billions…
NFL, CISA Look to Intercept Cyber Threats to Super Bowl LVIII
Published on October 2, 2023
via Dark Reading The NFL is workshopping game plays for Super Bowl LVIII — of the cybersecurity sort. Looking to juice up its defense, the league worked with the Cybersecurity and Infrastructure Security Agency (CISA) and Super Bowl LVIII stakeholders during a tabletop exercise that…
Cyber Hygiene: A First Line of Defense Against Evolving Cyberattacks
Published on September 25, 2023
via Dark Reading Basic security hygiene is more impactful than you may realize. While industry headlines are often dominated by emerging tech and the latest software or hardware solutions, base-level security hygiene still protects against 98% of attacks. This includes measures such as applying zero-trust principles or keeping…