Given that approximately 90% of the world’s enterprises use Active Directory (AD) as their primary authentication and authorization platform for organizations running Windows, it is no surprise that AD is a key target for cybercriminals.
Kathleen Kotwica, Executive Vice President and Chief Knowledge Strategist at the Security Executive Council, talks to Security magazine about her journey into security and the challenges faced when conducting research within the industry.
The open-source and developer community has adopted Open Policy Agent (OPA) as the de facto standard for authorization.
There are three critical ways OPA can help organizations solve for authorization:
The first and last line of defense against phishing is always employees themselves. With that in mind, here are the top five things you need to know about phishing.
Whether you build up in-house expertise or find a trusted outside partner, cybersecurity can no longer be a project set on the back burner. Let's walk through five prevalent cybersecurity threats for businesses, along with three helpful tips to combat them.
At HCA Healthcare, Kat Kemper, Director of Physical Security, has built the enterprise security program from the ground up, developing and implementing physical security measures to support patient care, privacy and overall security goals.
Given the increase in attack sophistication over the years, it is imperative for security leaders to establish new rules of the road for risk management and cyber fraud prevention.
Many schools that are looking to in-person learning in the fall are deciding whether to select cloud-based, off-prem solutions or on-premises infrastructure. While there can undoubtedly be pros and cons for each, it ultimately depends on your organization’s needs.