The PayPal breach of 2023 reminds us that 2FA isn’t a silver bullet and that credential security matters more than ever.
There is no doubt that growth in the Zero Trust market is fueled by the increasing frequency of cyber-attacks and regulations for data protection. But let’s face it, Zero Trust (ZT) is a chimera for most organizations. As long as we continue to define successful ZT as “MFA everything” and least privilege access everywhere, it’s never going to happen.
In 2017, the National Institute of Standards and Technology (NIST) released NIST Special Publication 800-63B Digital Identity Guidelines to help organizations properly comprehend and address risk as it relates to password management on the part of end users. Nearly every year since, NIST has undertaken to update or underscore these guidelines as security experts continue […]
Assessing The Risk of Compromised Credentials to The Enterprise Businesses today face an abundance of organizational risk. These come in the form of creating the business model itself, dealing with third parties, managing vendors and partners, monitoring internal and external fiscal fraud, exercising premise security, and the like. In the 21st century, no greater risk […]
by Stan Bounev and Chris Olive When faced with the problem of data being open to all users on an early, 1960’s mainframe computer, Fernando “Corby” Corbato rather nonchalantly assigned passwords to protect user private data, and the concept of the computer password was born. Fast forward to today, and no one ever would have […]
What’s really amazing is that both criminals and organizations have access to a nearly identical set identity information that has been stolen. The simplest, most straightforward solution is to actively and passively make sure such identity information, such as user credentials, can’t be reused. Unfortunately, many organizations have decided to take other approaches that are […]
I am frequently asked about how VeriClouds Identity Threat Protection is any different than the free service Have I Been Pwned (HIBP). As the world’s obsession with whether they have been pwned or not became more obsessive and more compulsive, my team at VeriClouds was busy building the next generation credential monitoring and verification platform. […]
Assessing The Risk of Compromised Credentials to The Enterprise Because technology now has a broad and pervasive impact on the successful operation of the business, comprehensive and accurate scoring and assessment of cybersecurity risk is absolutely essential and covers many areas of technology. To assess more accurately the cybersecurity risk, assessment of the compromised credential […]
December 26th, 2004. A powerful but mostly silent earthquake took place off the coast of northern Sumatra in the Indian Ocean. While beach goers on the eastern coast of India noticed the strange phenomena of the sea receding a few hundred yards, no one put “two and two” together based on this scant evidence. The […]