article thumbnail

GUEST ESSAY: ‘CyberXchange’ presents a much-needed platform for cybersecurity purchases

The Last Watchdog

Consider that PCI-DSS alone has over 250 complex requirements that include things like endpoint protection, password management, anti-virus, border security, data recovery and awareness training. That shift will start happening in the B2B sphere and the cybersecurity industry.

eCommerce 235
article thumbnail

Access Control: The 5 Single Sign-On Benefits

IT Security Guru

Supports Business to Business (B2B), Business to Consumer (B2C) and Business to Employee (B2E) activities (e.g., Bolsters Identity and Access Management (IAM) programs and an organization’s overall security posture. Password Vaults, SSO and Virtual Private Networks. provisioning and de-provisioning a single account).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH: ‘Passwordless authentication’ takes us closer to eliminating passwords as the weak link

The Last Watchdog

Clearly, for every advance made in password security – i.e. password managers and two-factor authentication (2FA) – threat actors likewise have been swift to adapt and innovate. And that’s really the way we see it evolving — from a B2B [business-to-business] play to a B2B2C [business-to-business-to-consumer] play.”

Passwords 164
article thumbnail

What Is a SaaS Security Checklist? Tips & Free Template

eSecurity Planet

These checklists include security standards and best practices for SaaS and cloud applications, and B2B SaaS providers use them to guarantee that their solutions match customer security standards. Encourage strong password practices: Provide tips on how to create complex passwords and use password management tools.

Risk 81
article thumbnail

The story of the year: remote work

SecureList

In the B2B sector, this manifested itself either in targeted attacks imitating email from specialized organizations, such as lures using the WHO logo and name, or attempting to take advantage of the fact that companies rapidly transitioned to remote work – often without having the time to ensure that proper security measures were in place.

Scams 57