Compliance mandates require many of our customers in regulated industries or in high-risk environments to prove adequate levels of protection for their data, no matter where it lives or travels. This is why we’ve continued to enhance the capabilities of both the YubiHSM 2 and YubiHSM 2 FIPS, the world’s smallest FIPS-validated and non-FIPS hardware security modules (HSMs). Today, we’re also excited to share that the YubiHSM 2 FIPS now meets FIPS 140-2, Level 3. Jump ahead to the “what’s new” section below to learn about the key new features in our YubiHSM 2 products.
10 Microsoft service account best practices
Microsoft service accounts are a critical part of any Windows ecosystem because they are used to run essential services and applications, from web servers to mail transport agents to databases. But all too often, they are not used and managed properly — which leaves the organization at unnecessary risk of business disruptions, security breaches and compliance failures. Indeed, problems with service accounts are one of the top four issues that we at Quest uncover during security assessments.
Steps to expedite the privileged access management implementation process
Every organization can draw a line from their entire operation to privileged accounts and systems. Within every system a company uses, there’s a privileged account behind it to access everything from employee emails to sensitive databases and personally identifiable information (PII) data. No matter what risk you point at in an organization, you can draw a threat vector from that risk to a privileged account. With 70 percent of breaches linked to privilege abuse, organizations need a streamlined approach to protecting identities and privileged access. Because these accounts pose an elevated risk, it’s key to get them under control as soon as possible. Speed is key. There are significant benefits to accelerating the privileged access management (PAM) implementation process.
How Transportation and Logistics Firms use Secure File Transfer
With DHL being one of the most spoofed domains, the logistics and transportation industry is turning more to secure file transfer. The shipping titan struggles with just one of the diverse security challenges the industry faces. Unfortunately, many of those risks are passed on to consumers, lessening industry credibility and creating unnecessary risk just when interconnectedness is at its peak and the demand for dependable goods transport is at its highest. Now, more than ever, shipping companies need to be on their game.
Expanded Security Key Series now available: Phishing-resistant, FIDO-only MFA for enterprises and individuals
Last month, we announced the expansion of both Yubico’s YubiEnterprise Subscription and our Security Key Series lineup, which included the addition of two new enterprise, FIDO-only (FIDO2/WebAuthn and FIDO U2F) keys. We’re excited to share that the Security Key Series are officially available today and can be purchased via our expanded YubiEnterprise Subscription program for enterprises or directly on Yubico.com for consumers.
Active Directory backup methodologies for your IT disaster recovery plan
Choosing the right Active Directory backup methodology is crucial for a successful disaster recovery plan. There are three primary ways to back up Active Directory:
How Does MFT Help Your Business in the Cloud?
An increasing number of people are switching to cloud infrastructure for their businesses, and there are good reasons to do so. As an abundance of companies has already transitioned to the cloud, migrations are increasingly taking place within the cloud, as these organizations migrate between different cloud providers (known as cloud-to-cloud migration). But for those making the initial foray to the cloud, there are a few critical items to consider.
Entering the New Era of Cybersecurity
Entering the new era of the cybersecurity landscape, it is more important than ever for businesses and organizations to implement robust defensive cybersecurity measures to protect their critical data and communications. The number of cyber-attacks has risen dramatically in recent years, with criminals receiving state-level support. This puts organizations, including government agencies, critical industries and infrastructure, financial institutions, authorities, health institutions, and individual citizens, at great risk.
Forging ahead: A CISOs top recommendations to stay secure in 2023
Last year, we anticipated that 2022 would be challenging for cybersecurity. This was proven true with the countless number of sophisticated high-profile phishing and ransomware attacks like DropBox, Twitter, Rockstar Games and Uber (twice).
Automation in Identity and Access Management and what it means for businesses
As organizations are looking to streamline processes and enhance security, pursuing automation in identity and access management is a key area businesses can target. By pursuing automation in identity and access management, IT teams can free up time to work on more important tasks, and reduce the friction required in managing team member and vendor access across necessary accounts, data and applications.
Need to move to a new Office 365 tenant? Let Quest On Demand Migration do the heavy lifting!
Today we live in a fast-moving world. Mergers and acquisitions are occurring at a record pace. Impacts of the recent pandemic are only likely to increase this trend. Over the past several years many companies have made the move to Office 365 for their email and collaboration needs. Office 365 is a great solution to streamline collaboration and support work from home initiatives, but what happens when it’s time to move? How will Bill from Research & Development be able to look back at previous collaborative ideas in Teams?
Why traditional sanitization methods as specified in DoD 5220.22-M are not sufficient for SSD erasure and can leave recoverable data behind?
The DoD specification was set long ago, when rotating magnetic media hard drives ruled the IT world. To erase these drives, overwriting all data with zeros or random patterns – whatever the standard offered – was enough. But the world changed and entered the age of digitalization, and with it came new hard drives like SSDs (solid state drives).
From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.
#02-72 WCEGA Tower,