article thumbnail

This Identity Management Day, Go BIG or Go HOME!

Thales Cloud Protection & Licensing

Passwordless, which was already becoming a boardroom topic, has now gotten a new impetus because of the mandates on phishing-resistant MFA on one side; and novel concepts like FIDO passkeys on the other. New domains like CIEM (Cloud Infrastructure Entitlement Management) and ITDR (Identity Thread Detection and Response) are gaining traction.

B2C 87
article thumbnail

Veridium Named Winner in the Coveted Global InfoSec Awards During RSA Conference 2021

CyberSecurity Insiders

After more than a year of working around and through limitations and changes in the workforce due to COVID-19, work-from-home scenarios are fairly standard and, unfortunately, expand opportunities for phishing attacks, brute force attacks and bad actors. Veridium is the industry’s only end-to-end passwordless platform provider.

InfoSec 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH: Cequence Security launches platform to shield apps, APIs from malicious botnets

The Last Watchdog

These baseline account takeovers can then be leveraged to spread spam, distribute phishing scams, launch denial of service attacks, infiltrate and plunder networks, execute wire fraud and more. Thus, what we’re experiencing today is the blossoming of B2B and B2C commerce transacted digitally.

article thumbnail

Herjavec Group Wins 4 Cyber Defense Magazine Global InfoSec Awards

Herjavec Group

HG Phishing HG Vulnerability Management . With over 5 Million monthly readers and growing, and thousands of pages of searchable online infosec content, Cyber Defense Magazine is the premier source of IT Security information for B2B and B2G with our sister magazine Cyber Security Magazine for B2C. HG Security Engineering .

InfoSec 52
article thumbnail

ChatGPT at work: how chatbots help employees, but threaten business

SecureList

It is quite possible for attackers to gain access to employee accounts — and the data in them — for example, through phishing attacks or credential stuffing. Consequently, the data usage, collection, storage, and processing terms and conditions are more geared toward protection than in the B2C segment.

article thumbnail

‘If you wait for government, you’re going to be waiting a long time’: A look at Biden’s cyber funding

SC Magazine

It depends whether the company is in the B2C market or in B2B. Most small companies don’t always think about risk and if they do think about risk, they actually think about it in very specific, technical ways (like phishing attacks or not putting passwords on Post-It notes). That’s a bigger concern.