The last few years have seen a number of breaches that call into question the traditional password. In no small part due to high profile security compromises like the Ashley Madison and VTech attacks, companies have learned that password-only policies can leave personal information vulnerable. According to our recent Wakefield survey on budgets, passwords and multi-factor authentication, 66% of companies polled have moved beyond a “passwords only” approach.
Last month, SecureAuth announced its partnership with DARPA-endorsed BehavioSec to deliver Adaptive Authentication with the use of behavioral biometrics. Now, SecureAuth is uniquely positioned to inspect authentication attempts, while maintaining a frictionless user experience. Garrett Bekker, an analyst with 451 Research, provides his insights into the new partnership with a report titled, “SecureAuth Bolsters Threat Detection with BehavioSec Partnership.” In the report, Garrett dis...
A few posts ago we mentioned the survey we conducted in collaboration with SC Magazine, where we asked 500 senior IT leaders about their security practices regarding access control. One aspect we talked about were those organizations that are still trusting the password-only method and where CISOs see themselves a few years down the road. While their methodologies and future plans varied, many of those IT leaders are aware their security programs need to evolve into more sophisticated controls -...
Imagine a data breach and you’ll likely picture it starting with a faceless hacker, maybe even a state-sponsored crime ring across the ocean. But one of the biggest security threats comes from insiders and it’s finally getting well-deserved attention.
You don’t need a survey to tell you how dismal cyber security is across the business landscape – just look at the breaches making the news. A survey can, however, explore the finer points of our security practices, illuminating which controls businesses are using, which are working and which aren’t, and their plans for the future.
Let’s just say it: healthcare IT security is in a state of crisis. Breaches are on the rise and growing larger and more serious all the time; costs are rising too, with an average breach cost of $398 per healthcare record, compared to the general record cost of $217. In fact, one estimated cost of healthcare breaches for 2015 is $5.6 billion.
With external threat actors getting in to your organization and insider threats increasing organizations need to step things up and move their identity perimeter from the outside of their network to the individuals logging on to it. External threat actors are using compromised credentials to impersonate insiders to breach the perimeter. Organizations need more than identity management to protect the new perimeter, they need secure access control. This infographic will explain how SecureAuth IdP ...
With compromised credential use on the rise, how can you be sure that the person logging in to your network is who they say they are based on only a username and password? The truth of the matter is, you can’t. In order to determine if the user logging in to your network is an approved individual then you need to confirm their identity.
Every IT department has the same goal: protect data from attackers and unauthorized users but make it available to authorized employees on any device and from anywhere. The Problem: Simple passwords and elementary data protection methods are easily worked around. Multi-Factor Authentication, one-time-passwords, and biometrics can improve security, but may not be as user friendly and convenient as the employee would like. Adaptive Authentication evaluates each access request and only s...
Healthcare IT teams now have more to manage than just the traditional infrastructure of an organization. With the Internet of Things, IT professionals have to worry about more smart devices being brought on to their network which in turn means more risk. Healthcare IT teams in particular have to worry about the adva