Stolen credentials and orphaned accounts can be abused to perform all manner of malicious activity online. Security professionals can enact many strategies to combat this situation.
It’s hard to know how many systems are already compromised by the log4j security vulnerability. It may take months or even years until we know if most critical systems were patched in time.
As employees travel during the holidays, many will be taking their work along for the journey. The surge in remote work due to the COVID-19 pandemic means that security professionals must remain vigilant this holiday season.
There are strategies for avoiding the downsides of typical micromanagement, however, by following the path of enlightened micromanagement. Here are a few tips.
Here are seven questions to ask vendors to guide your organization's evaluation of enterprise resource planning (ERP) application security, risk and compliance solutions.
Make your list and check it twice: by prioritizing authentication, eliminating passwords, deploying MFA and focusing on user experience, retail enterprise security leaders can ensure that hackers only get a lump of coal in their stockings.
Organizations looking to reduce their risk of being impacted by a severe weather incident may consider conducting a tabletop drill, an emergency management tool designed to increase business resilience.