article thumbnail

Why you need a strong authentication platform

Network World

According to Symantec ’s annual Internet Security Threat Report , up to 80 percent of breaches could be eliminated with strong authentication. With data breaches and information theft on the rise, it’s becoming even more crucial to protect your data from unwanted third parties.

article thumbnail

Fed Tech Roundup August 27

CTOvision

Symantec takes on the Internet of unsecured things - GCN.com. USPS Official: First Priority with Internet of Things is Cost Cutting - Nextgov. Prioritizing authentication, GitHub attacked, Carter back to Silicon Valley. North Dakota: Armed police drones and high-altitude, nighttime tests - GCN.com. FCW.com.

Symantec 150
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Understanding the Security Risks of New Cloud Software

CTOvision

All information traveling between your company network and the servers of your cloud provider exists, if only briefly at times, on the internet, where it could possibly be captured by malicious computers. However, some concerns about cloud security risks appeared early in the industry and are still relevant today. Exposed Data Transfers.

Cloud 150
article thumbnail

The future of trust—no more playing catch up

CIO Business Intelligence

By Eric Chien, Director of Security Response, Symantec Enterprise Division, Broadcom This is a continuation of Broadcom’s blog series: 2023 Tech Trends That Transform IT. About Eric Chien: Broadcom Eric Chien leads a team of engineers and threat hunters that investigate and reverse-engineer the latest high-impact Internet security attacks.

Trends 52
article thumbnail

A Question of Identity: The Evolution of Identity & Access Management

SecureWorld News

Ninety-five percent of cybersecurity breaches are due to human error (Symantec Internet Security Threat Report). Design and deploy an authentication / authorization process. Nation-state attackers have exploited high-severity vulnerabilities in legacy VPN platforms to breach networks. Establish an IoT identity lifecycle.

article thumbnail

The Importance of Connecting with Our Customers

CIO Business Intelligence

By Rob Greer, Vice President and General Manager, Symantec Enterprise Division. As the GM of Symantec , I had the good fortune of being able to attend both the Gartner Security & Risk Management Summit and the 2022 RSA Conference the week of June 6. About the Author: Broadcom Software. IT Leadership, Security

article thumbnail

The Hacker Mind: Follow The Rabbit

ForAllSecure

And I remember calling Symantec and reporting a serious bug in an early version of their password manager. After accessing that URL an authentication prompt popped up requesting for a certification certificate, meaning this is one of the doors we were looking for. We were able to authenticate to the cluster. cosmos.azure.com.