article thumbnail

Enterprise-managed IAM: An SRE team case study

IBM Big Data Hub

” The case study in this blog post shows how to easily and securely implement and manage a site reliability engineering (SRE) team’s access across an enterprise. Case study A large banking client has a centralized site reliability engineering (SRE) team that manages operations for all resources in the organization.

Cloud 78
article thumbnail

1,859 Android and iOS apps were containing hard-coded Amazon AWS credentials

Security Affairs

In some cases, the presence of the access keys has no specific reason, in other cases, they are part of testing and never removed code. These credentials are typically used for downloading appropriate resources necessary for the app’s functions as well as accessing configuration files and authenticating to other cloud services.

Cloud 96
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Emotat Malware Causes Physical Damage

Schneier on Security

The Emotet payload was delivered and executed on the systems of Fabrikam -- a fake name Microsoft gave the victim in their case study -- five days after the employee's user credentials were exfiltrated to the attacker's command and control (C&C) server.

Phishing 112
article thumbnail

Redcentric Partners with Thales to Provide Scalable, Flexible Remote Access

Thales Cloud Protection & Licensing

Here are four key benefits to our business from partnering with Thales to deliver cloud-based access management and authentication via SafeNet Trusted Access. Paying upfront for authentication services when customers were unsure of how many users they would need or for how long they’d need remote access would not be practical financially.

Access 70
article thumbnail

Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials

Elie

Drawing upon Google as a case study, we find 7–25% of exposed passwords match a victim’s Google account. For these accounts, we show how hardening authentication mechanisms to include additional risk signals such as a user’s historical geolocations and device profiles helps to mitigate the risk of hijacking.

article thumbnail

Clearing Up the Confusion between Document Management Systems and Digital Preservation Systems

Preservica

Some digital preservation systems may also include public access functionality.

article thumbnail

New book tackles the challenges of discovery in the (post-Google) era

CILIP

Facet Publishing announce the release of Resource Discovery for the Twenty-First Century Library: Case studies and perspectives on the role of IT in user engagement and empowerment, edited by Simon McLeish. New book tackles the challenges of discovery in the (post-Google) era.