More Organizations Need a Mature IAM Program as a Security Strategy
A widening gap exists between aspiration and achievement for organizations attempting identity-based security strategy modernization. Many organizations have identified that more sophisticated identity access management (IAM) and privileged access...
December 16, 2021
Read MoreLog4j Threat Alert | Bravura Security
Log4J has issued a level 10 security advisory ( CVE-2021-44228 ) due to an actively exploited zero-day vulnerability. The vulnerability is severe and allows a malicious actor to craft a payload that can trigger the running of arbitrary code on...
December 14, 2021
Read MoreReady for SaaS? You May Be, But What About Your Cybersecurity Strategy?
What do a pipeline, universities, and an NBA team all have in common? Usually, not much. However, in the last year all of these have fallen victim to ransomware attacks. Increasingly disruptive and sophisticated attacks are plaguing countless...
December 14, 2021
Read MoreWhat Is Zero Trust? Why Is It the Future of Cybersecurity?
Recent ransomware attacks and data breaches have called into question traditional virtual private network (VPN) and boundary-based models that many organizations previously relied on to keep their organizations safe. Perimeter-bound security may...
December 9, 2021
Read MoreCyber Insurance Premiums Are on the Rise. Zero Trust Can Help.
In the last 18 months, we have seen ransomware attacks cripple critical infrastructure, disrupt supply chains, and place significant financial burdens on thousands of businesses. The impact of these attacks have been sweeping and now organizations...
December 7, 2021
Read MoreWhat Is the Difference Between Identity Access Management and Identity Governance?
Mitigating identity-related access risks are essential as organizations continue to face changing threats every day. The management of access and digital identities (and their related risks) has grown in importance as many challenges stem from the...
December 2, 2021
Read MoreCritical Stepping Stones Towards Digital Transformation in Higher Education
As new realities have forced higher education institutions to move portions of the physical campus online, digital transformation is the only way forward to remain secure and competitive while simultaneously receiving an unprecedented number of...
November 30, 2021
Read MoreRansomware Holiday Hacks: Practical and Shareable Cybersecurity Tips
The holiday season is here, and it creates a potential cybersecurity mess for IT professionals that rivals a room of unwrapped presents on Christmas morning. Information security and technology professionals already face growing hybrid work...
November 18, 2021
Read MoreMaturity Matters: Is Your Zero Trust Strategy Keeping Up?
As organizations continue to strengthen their defenses, technology leaders must account for an ever-growing list of attack vectors: ransomware, phishing, DDoS attacks. With the exponential increase in breaches and a seemingly never-ending pool of...
November 17, 2021
Read MoreAttention Higher Ed: Governance Alone Is Not a Cybersecurity Strategy
Prioritization is essential in getting any cybersecurity strategy up and running and even more so for colleges and universities. Limited resources (both financial and human) paired with often complex requirements to secure the personal data can make...
November 9, 2021
Read More