article thumbnail

Companies need CASBs now more than ever — to help secure ‘digital transformation’

The Last Watchdog

While Shadow IT has been largely quelled, the core dynamic that started all this fuss – eager humans scrambling to use the latest, greatest cloud-enabled services – remains a major security issue, one that now connects directly to digital transformation. A synopsis of key takeaways: Misconfigurations.

article thumbnail

MY TAKE: A path for SMBs to achieve security maturity: start small controlling privileged accounts

The Last Watchdog

The challenge of embracing digital transformation while also quelling the accompanying cyber risks has never been greater for small- and mid-sized businesses. This applies to established companies migrating to cloud infrastructure as well as to digital native startups. Password concierge.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Identity Innovators at IDLive 2022: Humana, Toyota, US Bank and Others Reveal How AI, Cloud and Zero Trust Aid Digital Transformation

Security Boulevard

We now expect to have a frictionless experience with companies as they remember our preferences and make it easy to login without re-entering our password every time we need to buy more orange juice or want to order dinner. The way we interact with the companies we buy from has changed dramatically.

article thumbnail

MY TAKE: Businesses gravitate to ‘passwordless’ authentication — widespread consumer use up next

The Last Watchdog

This is one giant leap towards getting rid of passwords entirely. Excising passwords as the security linchpin to digital services is long, long overdue. Password abuse at scale arose shortly after the decision got made in the 1990s to make shared secrets the basis for securing digital connections.

article thumbnail

Credential Stuffing Fraud Attacks Make up 5% of All Digital Traffic

Security Boulevard

Credential stuffing fraud, which refers to automated sifting through volumes of stolen data to arrive at reams of valid username-password matches, continues to provide fraudsters with valid credentials to compromise and abuse these accounts be a successful attack tactic despite increased detection.

article thumbnail

SHARED INTEL: IT pros gravitate to ‘passwordless’ authentication to improve security, boost agility

The Last Watchdog

Meanwhile, 64 percent saw value in improving user experiences and 21 percent said it could help achieve digital transformation. Password abuse emerged as a criminal specialty shortly after the decision got made in the 1990s to jump start the commercial Internet using a security framework built on shared secrets.

article thumbnail

BrandPost: Deconstructing Identity Security

CSO Magazine

But many fail to grasp that the digital transformation, remote work, automation, and cloud migration activities of the last few years have turbocharged the number of identities seeking access to data and critical business systems. Most companies now recognize the serious and insidious nature of cybersecurity threats.