Reports

IAM_Concept_Adobe

The Essential Role of IAM in Remote Work

The sudden shift to 100% remote work has been jarring. How can businesses ensure remote workers are productive, while protecting sensitive data and minimizing cyberthreats? Rachael Stockton of LogMeIn and LastPass provides some tips.

COVID cyber concept

China Attacks Surge as Cyber Criminals Capitalize on COVID-19

COVID-19 has created a perfect storm for cybercriminals and nation-state hackers from China and elsewhere, according to research released Tuesday from VMWare and Carbon Black.

Administrative_login

As Cybercrooks Specialize, More Snooping, Less Smash and Grab

Cybercriminals are becoming more specialized as they try to extract the maximum value out of email account compromises, a new report by researchers at UC Berkeley and the security firm Barracuda Networks has found.

IBM Quantum Computer

How NIST Is Securing The Quantum Era

Quantum computers powerful enough to break the strongest classical encryption are at least a decade away, but the time to develop quantum safe encryption is now. In this opinion piece, Thomas Pöppelmann, a Senior Staff Engineer, Security Architecture and Cryptography Research at Infineon Technologies talks about the steps NIST and companies like Infineon are taking to make that happen.

Password Image

What’s Good IAM? The Answer may depend on your Industry

Mature identity and access management (IAM) is a pillar of enterprise security. But what makes IAM “good” for your business may depend on the kind of business you are in, and the demands of your industry, writes Rachael Stockton of LogMeIn and LastPass.