Tag cloud security

Rise in Hacks Targeting Cloud Single Sign-On in 2024

Cloud Security, Cybercrime, Fraud Management & Cybercrime Hackers Deploying Infostealers for Data and Credential Theft Akshaya Asokan (asokan_akshaya) • April 24, 2025 Image: David G Hayes / Shutterstock In 2024, a notable increase in cyberattacks aimed at cloud infrastructures was documented, with malicious actors exploiting misconfigurations and single sign-on functionalities…

Read MoreRise in Hacks Targeting Cloud Single Sign-On in 2024

Live Webinar: Why Your API is Vulnerable, How It Gets Compromised, and Effective Solutions to Protect It

Welcome to ISMG Registration Let’s complete your profile to keep you informed about the latest updates. Select Title LevelAnalytics/Architecture/EngineeringAttorney / General Counsel / CounselAVPBoard of DirectorC-Level ExecutiveC Level – OtherCCOCEO / PresidentCFOChairpersonCIOCISO / CSOCISO/CSO/CIOCOOCROCTODirectorEVP / SVP / FVPHeadHealthcare ProfessionalManagerManager / SupervisorPartnerSpecialist/OtherStaffVP–Other Title Level– Select Job FunctionAnti-Money Laundering (AML)AuditBSABusiness Continuity/Disaster RecoveryBusiness…

Read MoreLive Webinar: Why Your API is Vulnerable, How It Gets Compromised, and Effective Solutions to Protect It

Encryption Gaps Lead to Exploitable Vulnerabilities

Data Breach Epidemic Highlights Vulnerabilities in Encryption Practices Data breaches have emerged as a rampant issue, posing ongoing threats to businesses worldwide. While organizations invest heavily in advanced technologies for perimeter defense and access management, an often neglected component remains: data encryption. The lack of robust encryption strategies leaves businesses…

Read MoreEncryption Gaps Lead to Exploitable Vulnerabilities

Live Webinar | Rebuilding Resilience: Accelerating Your Minimum Viable Company in Times of Crisis

Thank You for Joining ISMG Complete your profile to receive the latest updates. Select Title LevelAnalytics/Architecture/EngineeringAttorney / General Counsel / CounselAVPBoard of DirectorC-Level ExecutiveC-Level – OtherChief Commercial OfficerChief Executive Officer / PresidentChief Financial OfficerChairpersonChief Information OfficerChief Information Security Officer / Chief Security OfficerCISO/CSO/CIOChief Operating OfficerChief Risk OfficerChief Technology OfficerDirectorExecutive Vice…

Read MoreLive Webinar | Rebuilding Resilience: Accelerating Your Minimum Viable Company in Times of Crisis

Infosys Acquires The Missing Link in $63 Million Cyber Services Transaction

Cloud Security, Governance & Risk Management, Security Operations Infosys Expands Cybersecurity Portfolio with Acquisition of Australian Firm Michael Novinson (@MichaelNovinson) • April 17, 2025 Indian multinational Infosys has announced the acquisition of The Missing Link, an Australian cybersecurity firm, for $63 million. This strategic move is aimed at enhancing Infosys’…

Read MoreInfosys Acquires The Missing Link in $63 Million Cyber Services Transaction

A Comprehensive Guide to Managing Machine Identities

Cloud Security, Governance & Risk Management, Identity & Access Management Three Essential Strategies for Security Leaders: Managing On-Premises and Cloud Identities Rajat Sapra • April 10, 2025 Image: Shutterstock In an era defined by rapid digital transformation, the surge in machine identities—each equipped with unique credentials, tokens, or applications—has been…

Read MoreA Comprehensive Guide to Managing Machine Identities