IdentityThree questions to ask about synthetic identitiesMorey HaberAugust 17, 2023New technologies have made it possible for criminals to do something they’ve done for generations: falsify someone’s identity.
Industry RegulationsHow zero-trust may conflict with PCI DSS v4.0Morey HaberJanuary 13, 2022Security pro Morey Haber points out that zero-trust may potentially conflict with the new PCI DSS v4.0 standard.
BreachFocus-in on the changing techniques for lateral movement within SaaS applicationsMorey HaberMay 28, 2021Today’s columnist, Morey Haber of BeyondTrust, points out that in the SolarWinds case lateral movement took place via auto-updates and not asset-to-asset and device-to-device.
Critical Infrastructure SecurityWorried about logic bombs? You should beMorey HaberMay 20, 2010All IP-enabled devices are at risk to devastating attacks that can result in the theft of intellectual property, or worse.