The Evolution of Cloud-Native Authorization

Authentication in the Age of SaaS and Cloud Let’s start with the differences between authentication and authorization. People tend to lump these concepts together as auth, but they’re two distinct processes. Authentication describes the process of finding out that you are…

IT Security News Daily Summary 2023-02-11

Uncle Sam wants to strip the IoS out of IoT with light crypto Test Data Compliance: How to Rewrite Your Organization’s DNA Why passkeys from Apple, Google, Microsoft may soon replace your passwords Dynamic Approaches Witnessed in AveMaria’s Distribution Strategy…

What is Vulnerability Scanning & How Does It Work?

Vulnerability scanning is the process of scanning IT networks and systems to identify security vulnerabilities in hardware and software. As enterprise IT environments have grown more complex, the ways hackers can attack them have grown too. The edge, cloud computing,…

North Korean Hackers Targeting Healthcare to Fund for Malicious Activities

The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has issued a new advisory regarding cybersecurity. This advisory details recent observations of TTPs used in North Korean ransomware operations.  These operations have targeted public health and other critical infrastructure sectors, highlighting…