article thumbnail

Iranian Peach Sandstorm group behind recent password spray attacks

Security Affairs

The cyber espionage activity attacks are aimed at organizations in the satellite, defense, and pharmaceutical sectors. Peach Sandstorm is an Iranian nation-state threat actor who has recently pursued organizations in the satellite, defense, and pharmaceutical sectors around the globe.”

Passwords 138
article thumbnail

BEST PRACTICES: Rising complexities of provisioning identities has pushed ‘IGA’ to the fore

The Last Watchdog

Its customer base is comprised of eight of the top 15 banks, four of the top six healthcare insurance and managed care providers, nine of the top 15 property and casualty insurance providers, five of the top 13 pharmaceutical companies, and 11 of the largest 15 federal agencies. Users re-defined. Most often, a user is a human being.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Four Use Cases Proving the Benefits of Metadata-Driven Automation

erwin

Metadata-Driven Automation in the Pharmaceutical Industry. One global pharmaceutical giant headquartered in the United States experienced such issues until it adopted metadata-driven automation. ROI on the automation solutions was realized within the first year.

article thumbnail

Enterprise Architect: A Role That Keeps Evolving

erwin

Enterprise architect is a common job title within IT organizations at large companies, but the term lacks any standard definition. That’s one of the reasons the enterprise architect role has no standard definition. What the enterprise architects at your organization do depends in large part on how the IT department is organized.

article thumbnail

Data Intelligence and Its Role in Combating Covid-19

erwin

Privately it will come from hospitals, labs, pharmaceutical companies, doctors and private health insurers. These numerous data types and data sources most definitely weren’t designed to work together. As a result, the data may be compromised, rendering faulty analyses and insights.

Metadata 122
article thumbnail

European Commission proposes reinforcement of EU Cybersecurity rules

DLA Piper Privacy Matters

On the basis of the size-cap criterium, all medium and large enterprises (as defined by the Commission Recommendation 2003/361/EC concerning the definition of micro, small and medium-sized enterprises) that fall under the definition of ‘essential entities’ would need to comply with the obligations.

article thumbnail

7 Benefits of Metadata Management

erwin

Connect physical metadata to specific data models, business terms, definitions and reusable design standards. Automate the collection of metadata from various data management silos and consolidate it into a single source. Structure and deploy data sources. Analyze metadata. Map data flows.

Metadata 110