Topic: access controls

  • Secure Active Directory with UserLock IAM: Product Showcase

    Secure Active Directory with UserLock IAM: Product Showcase

    UserLock is a modern IAM layer for Microsoft Active Directory that enhances security with granular MFA, contextual access rules, and real-time session monitoring without requiring a disruptive identity overhaul. It provides comprehensive visibility and control by aggregating AD entities into dash...

    Read More »
  • ChatGPT Expands Group Chats to Japan, New Zealand, South Korea & Taiwan

    ChatGPT Expands Group Chats to Japan, New Zealand, South Korea & Taiwan

    OpenAI has launched a group chat feature for ChatGPT in Japan, New Zealand, South Korea, and Taiwan, enabling real-time collaboration across multiple subscription tiers on mobile and web. The feature prioritizes privacy with invitation-only access, individual conversation confidentiality, and enh...

    Read More »
  • Secure Your Credentials: IT's Multi-System Strategy

    Secure Your Credentials: IT's Multi-System Strategy

    IT teams must securely manage credentials across systems using a comprehensive approach that combines technology, policy, and training to address escalating cyber threats. Key security measures include strong authentication like multi-factor authentication, encryption for data protection, and con...

    Read More »
  • Unlock Customer Sentiment & Risk Hidden in Your CRM Emails

    Unlock Customer Sentiment & Risk Hidden in Your CRM Emails

    Generative AI transforms inbound CRM email analysis by uncovering customer sentiment and risks, shifting focus from traditional outbound metrics to understanding actual communication content and emotional tone. Natural language processing reveals nuanced customer emotions, pain points, and buying...

    Read More »
  • Perplexity Faces Lawsuit Over Reddit Data Scraping

    Perplexity Faces Lawsuit Over Reddit Data Scraping

    Reddit has sued Perplexity and three data-scraping firms in federal court, accusing them of bypassing access controls to harvest Reddit content on a large scale, including through Google search results. Perplexity defends its actions by stating it only summarizes and cites Reddit discussions with...

    Read More »
  • The Password Problem We Still Haven't Solved

    The Password Problem We Still Haven't Solved

    Identity-related breaches persist due to basic vulnerabilities like reused passwords and insufficient verification, allowing attackers prolonged network access. Passwords remain the dominant authentication method despite intentions to go passwordless, hindered by legacy systems and diverse enviro...

    Read More »
  • Master Zero Trust & Identity at Today's Virtual Summit

    Master Zero Trust & Identity at Today's Virtual Summit

    The SecurityWeek Zero Trust & Identity Strategies Summit 2025 is a virtual event focusing on modern cybersecurity frameworks and the evolution of Zero Trust into a core strategy for protecting corporate assets. Zero Trust Network Access (ZTNA) is highlighted as essential for strengthening access ...

    Read More »
  • Cranium AI Boosts Compliance, Security & Scalability

    Cranium AI Boosts Compliance, Security & Scalability

    Cranium AI has launched new agentic AI features to help businesses accelerate AI agent use, simplify compliance, and strengthen security with operational control and automated monitoring. Key products include AgentSensor for visibility into AI agents, CloudSensor for cloud security monitoring, an...

    Read More »
  • Discord Data Breach: Vendor Denies Being Hacked

    Discord Data Breach: Vendor Denies Being Hacked

    5CA denies experiencing a data breach in its systems and clarifies it never handled government-issued IDs for the affected client, maintaining secure operations under strong data protection protocols. An ongoing forensic investigation, involving the client and cybersecurity experts, indicates the...

    Read More »
  • American Archive of Public Broadcasting Patches Security Flaw

    American Archive of Public Broadcasting Patches Security Flaw

    A security flaw in the American Archive of Public Broadcasting (AAPB) website allowed unauthorized downloads of protected media files for years, which was exploited since at least 2021 and has now been fixed. The vulnerability was an Insecure Direct Object Reference (IDOR) flaw that let users byp...

    Read More »
  • Cisco ASA Devices Face Surge in Network Scans

    Cisco ASA Devices Face Surge in Network Scans

    A significant surge in network scanning activity targeting Cisco ASA devices has been detected, with spikes in late August involving up to 25,000 unique IP addresses, suggesting potential vulnerability exploitation. The scanning was largely driven by a Brazilian botnet and focused heavily on the ...

    Read More »
  • Insider Threats, Malware & AI: The Rising File Security Crisis

    Insider Threats, Malware & AI: The Rising File Security Crisis

    File security breaches are escalating, causing significant financial losses, stolen data, and intellectual property exposure across organizations. Insider threats, weak access controls, and evolving malware like ransomware and zero-day threats are major vulnerabilities, with many companies lackin...

    Read More »
  • AI's Success Hinges on Trusted, Well-Governed Data

    AI's Success Hinges on Trusted, Well-Governed Data

    Many businesses are struggling to implement AI effectively due to a lack of trusted, well-governed data, which is essential for reliable and secure outcomes. A significant challenge is the complexity and security risks associated with unstructured data, with many organizations citing budget const...

    Read More »
  • Bots Exposed: The Growing Threat of Data Leaks

    Bots Exposed: The Growing Threat of Data Leaks

    Non-human identities (NHIs) like bots and automation scripts are now the fastest-growing security risk, leaking sensitive data more than human-related vulnerabilities. Machine identities outnumber human ones 144 to 1, with credentials often forgotten, overprivileged, or stored in risky locations ...

    Read More »
  • ClickFix Exploits MHSTA to Evade Security for Infostealers

    ClickFix Exploits MHSTA to Evade Security for Infostealers

    ClickFix is a growing social engineering tactic that tricks users into executing harmful commands by pretending to fix system issues, often through deceptive pop-ups. ClickFix has driven a 10% increase in drive-by compromises and is now the second most common evasion technique, often exploiting t...

    Read More »