Edge computing has been around for the better part of three decades, but it only entered the mainstream technology conversation a few years ago when it became a key enabler of Internet of Things (IoT) projects. While it remains essential for facilitating IoT initiatives, the edge model now has far more broad appeal with important use cases in practically every industry vertical.
The recent Uber hack is a stark reminder that unsecured privileged account credentials represent the keys to the kingdom for malicious actors. In the Sept. 15 breach, an attacker compromised an administrator account with elevated privileges to gain unfettered access to the ride-hailing company’s IT systems.
After a couple of years of supporting remote workforces, most organizations felt quite prepared for the transition to a hybrid work model in which employees split their time between onsite and office work. However, many are finding that disjointed communication environments are making it more difficult than they imagined.
Phishing attacks have soared to record levels over the past year, driven in large part by the increased use of popular messaging platforms as a delivery mechanism. Forty percent of IT professionals say they’ve seen an uptick in messaging-delivered phishing attacks over the past 12 months, according to one study.
The password has been a linchpin of security for centuries but it is easily the weakest link in IT security today. As a result, organizations across the globe are stepping up efforts to eliminate passwords once and for all. More than two-thirds of respondents to a Forrester Research survey say they are in the process of adopting passwordless authentication for their employees and partners.