Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations //

Identity & Access Management

News & Commentary
Is Edtech the Greatest APT?
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Educational technology is critical but can come at huge costs to student and teacher privacy and security. Are those costs too high?
By Curtis Franklin Jr. Senior Editor at Dark Reading, 8/11/2020
Comment0 comments  |  Read  |  Post a Comment
EU-US Privacy Shield Dissolution: What Happens Next?
Sam Curry, CSO, CybereasonCommentary
In a world that isn't private by design, security and liability implications for US-based cloud companies are huge.
By Sam Curry CSO, Cybereason, 8/11/2020
Comment0 comments  |  Read  |  Post a Comment
Gamifying Password Training Shows Security Benefits
Robert Lemos, Contributing WriterNews
When picking passwords, users often fall back on certain insecure patterns, but good habits can be learned using simple games, a group of researchers find.
By Robert Lemos Contributing Writer, 8/10/2020
Comment0 comments  |  Read  |  Post a Comment
Attack of the Clone: Next-Gen Social Engineering
Dark Reading Staff, News
NeoEYED CTO Tamaghna Basu tells us how he created an AI bot to mimic him, how it could be used in social engineering attacks, and what the experience taught him about the value of true human connections.
By Dark Reading Staff , 8/5/2020
Comment0 comments  |  Read  |  Post a Comment
Pandemic Credential Stuffing: Cybersecurity's Ultimate Inside Job
Alex Artamonov, System Engineer & Cybersecurity Specialist, Infinitely VirtualCommentary
How stolen credentials for services like Zoom and password reuse practices threaten to compromise other accounts and applications.
By Alex Artamonov System Engineer & Cybersecurity Specialist, Infinitely Virtual, 7/27/2020
Comment0 comments  |  Read  |  Post a Comment
Email Security Features Fail to Prevent Phishable 'From' Addresses
Robert Lemos, Contributing WriterNews
The security features for verifying the source of an email header fail to work together properly in many implementations, according to a team of researchers.
By Robert Lemos Contributing Writer, 7/24/2020
Comment1 Comment  |  Read  |  Post a Comment
Deepfakes & James Bond Research Project: Cool but Dangerous
Matt Lewis, Technical Research Director at NCC GroupCommentary
Open source software for creating deepfakes is getting better and better, to the chagrin of researchers
By Matt Lewis Technical Research Director at NCC Group, 7/23/2020
Comment1 Comment  |  Read  |  Post a Comment
4 Steps to a More Mature Identity Program
Mike Kiser, Global Security Advocate, Office of the CTO, SailPointCommentary
Security has evolved to evaluate an identity's attributes, access, and behavior to determine appropriate access.
By Mike Kiser Global Security Advocate, Office of the CTO, SailPoint, 7/1/2020
Comment0 comments  |  Read  |  Post a Comment
Back to Basics with Cloud Permissions Management
Raj Mallempati, COO, CloudKnox SecurityCommentary
By using the AAA permissions management framework for cloud operations, organizations can address authentication, authorization, and auditing.
By Raj Mallempati COO, CloudKnox Security, 6/23/2020
Comment0 comments  |  Read  |  Post a Comment
5 Steps for Implementing Multicloud Identity
Eric Olden, CEO, Strata IdentityCommentary
Why embracing, not fighting, decentralization will pave the way to smoother cloud migrations.
By Eric Olden CEO, Strata Identity, 6/23/2020
Comment0 comments  |  Read  |  Post a Comment
The Bigger the News, the Bigger the Cyber Threats
Len Shneyder, Co-Chair of the Election Special Interest Group at the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG)Commentary
Criminals use disasters, wars, and now pandemics as air cover to focus collective anxiety and fear into highly targeted, malicious messaging.
By Len Shneyder Co-Chair of the Election Special Interest Group at the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG), 6/18/2020
Comment0 comments  |  Read  |  Post a Comment
CISO Dialogue: How to Optimize Your Security Budget
Chris Triolo, Vice President of Customer Success, Respond SoftwareCommentary
CISOs are never going to have all the finances they want. Hard choices must be made. The CISO of Amazon Prime Video discusses his approaches to a slimmed-down budget.
By Chris Triolo Vice President of Customer Success, Respond Software, 6/18/2020
Comment0 comments  |  Read  |  Post a Comment
The Telehealth Attack Surface
Justine Bone, CEO, MedSecCommentary
Amid the surge in digital healthcare stemming from the coronavirus pandemic, security is taking a backseat to usability.
By Justine Bone CEO, MedSec, 6/10/2020
Comment1 Comment  |  Read  |  Post a Comment
CSO's Guide to 'Employee-First' Security Operations During COVID-19 & Beyond
George Gerchow, Chief Security Officer, Sumo LogicCommentary
As the work-at-home environment continues to inform new ways of doing business, it's important that security teams remain flexible and ready for change.
By George Gerchow Chief Security Officer, Sumo Logic, 6/9/2020
Comment0 comments  |  Read  |  Post a Comment
Thycotic Buys Onion ID to Extend PAM Portfolio
Dark Reading Staff, Quick Hits
The acquisition brings three new products into Thycotic's privileged access management lineup.
By Dark Reading Staff , 6/2/2020
Comment0 comments  |  Read  |  Post a Comment
All Links Are Safe ... Right?
Beyond the Edge, Dark Reading
Today is a perfect day for a security breach.
By Beyond the Edge Dark Reading, 5/29/2020
Comment0 comments  |  Read  |  Post a Comment
79% of Companies Report Identity-Related Breach in Past Two Years
Dark Reading Staff, Quick Hits
Two-thirds of organizations surveyed say phishing is the most common cause of identity-related breaches, the IDSA reports.
By Dark Reading Staff , 5/14/2020
Comment0 comments  |  Read  |  Post a Comment
Biometrics in the Great Beyond
Curtis Franklin Jr., Senior Editor at Dark Reading
A thumbprint may be a good authentication factor for the living, but are you prepared to access mission-critical data and devices after an employee's death?
By Curtis Franklin Jr. Senior Editor at Dark Reading, 5/13/2020
Comment0 comments  |  Read  |  Post a Comment
CyberArk Acquires Idaptive for Identity-as-a-Service Tech
Dark Reading Staff, Quick Hits
The $70 million deal is intended to help CyberArk strengthen its portfolio with secure and SaaS-based identity management.
By Dark Reading Staff , 5/13/2020
Comment0 comments  |  Read  |  Post a Comment
Microsoft Identity VP Shares How and Why to Ditch Passwords
Kelly Sheridan, Staff Editor, Dark ReadingNews
Passwords are on their way out, says Joy Chik, who offers guidance for businesses hoping to shift away from them.
By Kelly Sheridan Staff Editor, Dark Reading, 5/7/2020
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/14/2020
Lock-Pickers Face an Uncertain Future Online
Seth Rosenblatt, Contributing Writer,  8/10/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 New Cybersecurity Vulnerabilities That Could Put Your Enterprise at Risk
In this Dark Reading Tech Digest, we look at the ways security researchers and ethical hackers find critical vulnerabilities and offer insights into how you can fix them before attackers can exploit them.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-17475
PUBLISHED: 2020-08-14
Lack of authentication in the network relays used in MEGVII Koala 2.9.1-c3s allows attackers to grant physical access to anyone by sending packet data to UDP port 5000.
CVE-2020-0255
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-10751. Reason: This candidate is a duplicate of CVE-2020-10751. Notes: All CVE users should reference CVE-2020-10751 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidenta...
CVE-2020-14353
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-18270. Reason: This candidate is a duplicate of CVE-2017-18270. Notes: All CVE users should reference CVE-2017-18270 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidenta...
CVE-2020-17464
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVE-2020-17473
PUBLISHED: 2020-08-14
Lack of mutual authentication in ZKTeco FaceDepot 7B 1.0.213 and ZKBiosecurity Server 1.0.0_20190723 allows an attacker to obtain a long-lasting token by impersonating the server.