News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Identity and Access Management with Dark Web Monitor 
Identity and Access Management with Dark Web Monitor

Stolen or leaked credentials lead cyber attackers into the corporate network without any hurdles. WatchGuard strengthens its identity and access management with additional functions such as a password manager and a dark web monitor service for improved implementation of zero trust policies. With the recently presented "AuthPoint Total Identity Security" bundle, WatchGuard Technologies is expanding its offering in the area of ​​identity and access management in a targeted manner. The new service package expands the already established multi-factor authentication (MFA) "WatchGuard AuthPoint" with a dark web monitor service and a suitable password manager. Through the coordinated interaction of these functionalities along the risk-based zero trust policies of the WatchGuard Unified Security Platform architecture, managed...

Read more

Stolen credentials are the biggest security risk

The Verizon Data Breach Investigations Report 2022 (DBIR) examined 23.896 security incidents and 5.212 confirmed data breaches. He comes to one conclusion: Leaked and stolen access data are still the greatest security risk for companies. From the analysis of the more than 100-page report, Patrick McBride, Chief Marketing Officer of Beyond Identity, has compiled the most important figures and offers tips on how companies can protect themselves from data leaks. Top 5 Statistics from the Verizon DBIR Stolen Passwords: The most popular method for attackers to steal a company's assets,…

Read more

Problem area: weak point access data

Credentials vulnerability: Identity and access management best practices. When it comes to passwords, their online presence offers companies a broad digital attack surface that cyberattackers can break through in various ways. If they succeed in stealing valid access data from an account, they can use the hijacked identity to steal valuable data or cause further damage in corporate environments. In a working world that is increasingly characterized by remote work, the security and credibility of digital identities are gaining new relevance. Similar to physical forms of identification, digital forms of identification must also be reliably protected against misuse, theft and fraud. The digital ...

Read more

Theft of access data: every 2nd company affected
Theft of access data: every 2nd company affected

Over half of the companies are affected by the theft of privileged access data and insider threats. ThycoticCentrify study: 77 percent use the zero trust approach in response to increased attacks on critical systems and data. Over half of companies struggled with privileged login theft (53 percent) and insider threats (52 percent) in the past twelve months. This is shown by a new study by ThycoticCentrify, a leading provider of cloud identity security solutions. In 85 percent of the cases in which cybercriminals stole privileged credentials, they were able to access critical systems and / or data. In addition, 66 percent of insider threats resulted in ...

Read more