Weak identity security for IoT and IIoT are fueling ransomware attacks on critical U.S. infrastructure. Use these best practices as a starting point to develop an identity governance strategy that can protect water treatment plants, fuel processing operations and any other internet-connected devices and resources.
The Kaseya ransomware attack underscores the need to change the cost of doing business for cybercriminals. We see far too many cybercrimes of opportunity. But by understanding hackers’ motivations and making their work a little tougher, cybersecurity can make big strides in protecting our customers, colleagues, and IP.
President Biden’s executive order on cybersecurity will help public agencies harden their defenses and pursue their missions. Review some of the highest-value new requirements for zero trust, cloud identity, MFA, and threat intelligence.
The Colonial Pipeline ransomware attack makes a clear case for a strong program of identity and access management in which identity governance and multi-factor authentication (MFA) play critical roles in keeping attackers out and keeping assets safe.
Public Key Infrastructure (PKI) has dominated the security ecosystem for 60 years. But modern requirements call for modern solutions: increasingly, organizations are making the shift to FIDO to accelerate their cloud journeys while still securing access.
SecurID is the trusted identity platform for 13,000 organizations. Why? Our focus on customer needs, cloud, and customer support. And after an unprecedented year, these qualities are more important than ever. Read Ted Kamionek's blog post to see why.
Robotic Process Automation plays a key role in the enterprise, executing repetitive tasks with ‘bots’ instead of human staff. But this technology comes with new risks – what does that ‘bot’ account have access to, and who is accountable for that account?
Zero Trust is the security leader's 'answer de jour' for addressing rapidly accelerating digital transformation projects. Where should it fall among the myriad of security and risk priorities? How does it fit in a broader digital risk management context? What foundational elements are needed to pursue it?
The newly independent RSA is going through our own digital transformation and deploying the IT infrastructure to support a wide variety of business functions to best serve our stakeholders and our customers. RSA CISO Kelly Sarber shares her views on the role identity and access management plays in the mission of reducing digital risk.