Remove 07
Remove 2021 Remove Authentication Remove Government Remove IT
article thumbnail

US CISA added 17 flaws to its Known Exploited Vulnerabilities Catalog

Security Affairs

CVE Number CVE Title Required Action Due Date CVE-2021-32648 October CMS Improper Authentication 2/1/2022 CVE-2021-21315 System Information Library for node.js CVE Number CVE Title Required Action Due Date CVE-2021-32648 October CMS Improper Authentication 2/1/2022 CVE-2021-21315 System Information Library for node.js

CMS 104
article thumbnail

How FIDO 2 authentication can help achieve regulatory compliance

Thales Cloud Protection & Licensing

How FIDO 2 authentication can help achieve regulatory compliance. Thu, 06/24/2021 - 07:22. Businesses are governed by an increasingly complex network of regulations, jurisdictions, and standards which dictate security and privacy requirements. Failure to do so could trigger violations of other regulatory requirements.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Executive Order About Cybersecurity Urging Zero Trust Adoption

Thales Cloud Protection & Licensing

Thu, 09/02/2021 - 07:09. During the 2021 Thales Crypto Summit , which brings together a group of experts to speak about cryptographic and key management to keep organizations secure, President Biden’s Executive Order (EO) was a key point of discussion. Executive Order About Cybersecurity Urging Zero Trust Adoption.

article thumbnail

The Ongoing Cyber Threat to Critical Infrastructure

Thales Cloud Protection & Licensing

Thu, 07/21/2022 - 12:28. Security breaches in this sector can be incredibly disruptive to society and are attracting considerable attention from governments and regulatory bodies around the world. gas pipeline in 2021 to the rise of nation-state attacks, critical infrastructure organizations are under siege.

article thumbnail

Key Developments in IoT Security

Thales Cloud Protection & Licensing

Thu, 07/15/2021 - 10:09. The rise of IoT has not gone unnoticed in government circles. Along with that, strong encryption, certificate-based authentication, or the ability to layer an organization's certificate onto a device will go a long way towards creating a more secure IoT environment. Data security.

IoT 100
article thumbnail

Think Zero Trust Applies Only to Federal Agencies? Think Again!

Thales Cloud Protection & Licensing

Thu, 07/07/2022 - 05:42. These solutions do this by offering various capabilities like Bring-Your-Own-Encryption (BYOE), multi-factor authentication, and risk assessment. It will also help to motivate other industries not governed by specific regulations to be more proactive about implementing more effective access security.”.

article thumbnail

Cybersecurity Awareness Month: The value of cyber hygiene in protecting your business from potential ransomware

Thales Cloud Protection & Licensing

Thu, 09/30/2021 - 07:58. The May 2021 ransomware attack on Colonial Pipeline was a harsh reminder for corporations of how easily the dominos can fall within an organisation without adequate cybersecurity measures. Cybersecurity Awareness Month: The value of cyber hygiene in protecting your business from potential ransomware.