Information Security

The SecurityInfoWatch.com Information Security product category is a collection of news, product listings and other resources for security professionals researching Information Security solutions. It covers a wide variety of network security hardware and software products.
Access & Identity

How FIDO Can Safeguard Against Advanced Cyber Threats

March 3, 2025
Now is the time for organizations to evaluate their authentication strategies proactively.
Alexander Sikov / iStock / Getty Images Plus via Getty Images
In 2024, the healthcare sector experienced an unprecedented increase in ransomware attacks, affecting over 198 million Americans. Among these incidents, the Change Healthcare breach stood out as one of the largest in history, impacting more than 100 million individuals. Source: SonicWall
Cybersecurity

SMBs and healthcare face relentless cyber threats, SonicWall warns

Feb. 25, 2025
The 2025 SonicWall Cyber Threat Report reveals that cybercriminals are exploiting vulnerabilities faster than organizations can patch them, putting SMBs and healthcare providers...
Credit: Vladimir Vladimirov
As businesses and governments pour resources into developing proprietary quantum algorithms, they will become invaluable, shrouded in secrecy, and fiercely guarded.
Cybersecurity

Quantum of Solace: Corporate espionage in the quantum age

Feb. 24, 2025
As quantum computing reshapes the corporate battlefield, espionage is evolving beyond hackers and spies—organizations must master quantum security or risk losing their competitive...
Credit: stuartmiles99
Getting control over identity management requires a comprehensive and ongoing process from risk assessment through daily management.
Information Security

Strategies for demystifying IAM

Feb. 24, 2025
Amid a rising tide of data breaches, organizations are struggling to control identity management options.
Credit: BeeBright
DORA also affects regions outside of the EU. Although the Digital Operational Resilience Act (DORA) is an EU regulation, it is also applicable in the U.S. market. It enforces third-party risk management by holding financial institutions accountable for their vendors' operational resilience.
Information Security

Digital Operational Resilience Act (DORA) in Full Swing in EU

Feb. 19, 2025
U.S. organizations are looking to embrace similar regulatory guidelines across myriad sectors.
Credit: danijelala
By gaining access to an employee’s credentials, a bad actor also gains access to their account privileges, especially if the same credentials are used across multiple accounts.
Access & Identity

Strategies for reducing the dangers of credential theft

Jan. 29, 2025
If credentials are compromised, spotting the breach quickly, the damage can be contained.
Credit: Just Super
A platform-agnostic Managed Detection and Response (MDR) solution refers to a service provider that offers MDR services independently of any specific cybersecurity platform or technology stack, becoming a “platform” in and of itself, along with advisory services that help select the best-of-breed tooling.
Cybersecurity

Platforms vs best-of-breed solutions: why not both?

Jan. 29, 2025
Whether opting for an integrated platform or a mix of specialized tools, the key is establishing a robust cybersecurity strategy.
Sectigo acquires Entrust public certificate business
Encryption Solutions

Sectigo acquires Entrust public certificate business

Jan. 29, 2025
The acquisition unlocks new growth opportunities for Sectigo to provide enhanced CLM capabilities to a broader customer base.
Credit: thitivong
In an increasingly competitive global marketplace, now is the time to consider partnering with an LSP to take advantage of the many benefits of TMS and integration technology.
Critical Infrastructure

How transportation management systems mitigate supply chain risks for manufacturers

Jan. 18, 2025
Investing in a partnership with a Logistics Service Provider (LSP) can help organizations implement and operate a TMS would be a transformative step.
Credit:gopixa
As the global financial system becomes more interconnected, it's apparent that regulatory frameworks like DORA are not isolated to one region. U.S. companies, especially those in the information and communication technology (ICT) sectors, need to pay close attention to DORA’s implementation.
Cybersecurity

DORA compliance is a strategic necessity for U.S. companies serving EU financial institutions

Jan. 17, 2025
As DORA takes effect, recovery resilience tops the compliance agenda.