MoqHao Evolution Poses Immense Threat to Android Users

Cybersecurity threat experts have recently discovered a new variant of the malware named XLoader, commonly known as MoqHao, that has the ability to automatically infect devices without any user interaction. Being termed ...
digital identity, organizations, IGA driver's license identity verification

Identity Governance Has a Permission Problem

Identity's role as the new security perimeter in the cloud is driving a new set of governance requirements and making permissions tricky ...
Security Boulevard
Google software security

Frontend Developers: Security Champions of the New Age

Web development has undergone dramatic changes since its inception. However, one pervasive problem still exists: Frontend developers are still required to lean on backend developers to use APIs, write backend code or ...
Security Boulevard

Major Database Security Threats & How You Can Prevent Them

Organizations and businesses must use a range of measures, protocols, and tools to protect their databases from cybercriminals. If breached, malicious actors can gain access to sensitive information that they can use ...
Lacework cloud security fortinet Juniper strategy IAM Datadog CSA cloud security SMBs cloud

The Rise of Software Developers in Cloud Security

| | Cloud, DevSecOps, Permissions, security
It has never been more critical than it is today to get things right in terms of cloud safety and security when building new software. Yet many organizations are still suffering from ...
Security Boulevard
Palo Alto Networks risk Exabeam

Palo Alto Networks Report Reveals Cloud Security Challenges

An analysis of more than 680,000 identities across 18,000 cloud accounts from 200 different organizations published this week by Palo Alto Networks found nearly all (99%) cloud users, roles, services and resources ...
Security Boulevard
onboarding First Amendment

Securing Onboarding and Offboarding in the Cloud 

One of the most fundamental challenges of securing the identity-defined perimeter is efficiently managing and securing the cloud identity life cycle.  This priority comes into sharpest focus with offboarding users—or, more accurately, ...
Security Boulevard
Active Directory

Cleaning up the Active Directory Forest

Used by many organizations and enterprises, Microsoft’s Active Directory (AD) comprises several services that run on Windows Server to manage permissions and access to networked resources. Within the Active Directory configuration hierarchy, ...
Security Boulevard