2021 ForgeRock Consumer Identity Breach Report

Thumb original forgerock consumer identity breach 2021 report

The year 2020 witnessed a massive digital migration. People did almost everything online – purchasing goods and services, consulting with healthcare professionals, arranging for meal deliveries, distance learning, and, of course, working from home.

Meanwhile, malicious actors did not skip a beat. This year’s report notably reveals that attacks involving usernames and passwords increased a staggering 450% over 2019, translating into more than 1 billion compromised records in the U.S. alone. With users spending more than double the amount of time online,1 their tendency to reuse common passwords continued to make this attack vector extremely attractive to cybercriminals.

Surprisingly, even with all this online activity, the number of mega-breaches decreased in 2020 and, correspondingly, so did the number of records compromised. However, the total number of breaches increased. Those involving less than 100 million records shot up by 50%. For smaller enterprises hoping to be ignored or biding their time in adopting Zero Trust security, 2020 shows us that they must
not wait. Cybercriminals are working their way into organizations of all sizes with the intent to seize valuable assets.

Read this report to find out how usernames and passwords found their way Into the crosshairs of attackers.

View report
Provider: ForgeRock   |   Size: 734 KB   |   Language: English
Keep Reading:
Thumb original how to migrate from oracle access manager to the forgerock identity platform

How to Migrate from Oracle Access Manager to ForgeRock Identity & Access Management

Migrating from Oracle Access Manager (OAM) to ForgeRock Identity & Access Management (IAM)

Looking for an Oracle Access Manager alternative?
Legacy Web Access Management (WAM) systems like Oracle Access Management (OAM) have fundamental gaps that inhibit your business value and impede digital transformation. Fortunately, you can have a modern IAM system co-exist with the current legacy Oracle system, adding immediate value to your business, as you then plan a phased approach to migrate off of the old platform.

In this paper, we d ...

Access this Whitepaper
Thumb original evaluating digital identity providers for ciam

Evaluating Digital Identity Providers for Customer Identity and Access Management

Evaluation Framework for Customer Identity and Access Management
Today, six digital transformation trends are directing how you conduct business. These trends necessitate a different approach to customer identity and access management - one that is all-encompassing for any identity and built for the future.

This highly informative paper helps decision-makers navigate how to evaluate digital identity providers for customer identity and access management (CIAM) based on the six trends. This guide includes definitions and use cases for the mod ...

Access this Whitepaper
Thumb original 1373352 ransomware vs. multi cloud ebook

Ransomware vs. Multi-Cloud: How to Protect Multi-Cloud Environments From the Next Attack

Though the scale and economics of the cloud are a boon for today’s enterprise, moving applications and data out of the data center into multi-cloud environments has greatly expanded threat surfaces, putting enterprises at greater risk of devastating ransomware attacks. This report will explore how to move beyond segmentation inside the data center and traditional next-gen firewalls at the perimeter and build a defense that meets the special demands of a multi-cloud environment. ...

View report
Thumb original 1250813 23q1 exposing malware in linux based multi cloud environments

THREAT REPORT: Exposing Malware in Linux-Based Multi-Cloud Environments

90% of cloud runs on Linux. So, is it any wonder that malware is propagating in multi-cloud environments under the radar? Current countermeasures are focused on addressing Windows-based threats, leaving multi-cloud deployments vulnerable to attacks.

Based on research conducted by the VMware Threat Analysis Unit, this report uncovers the unique characteristics of remote access tools (RATs), ransomware, and cryptominers on Linux-based systems and how you can mitigate these threats. You will learn more about:

Existing characterization tech ...

View report
Thumb original 656351 internal firewalls ebook

Internal Firewalls for Dummies Guide

Organizations can no longer rely on edge firewalls alone to provide network security. Once attackers get past an edge firewall, they can move laterally to high-value assets. This book illustrates how internal firewalls can help your organization secure east-west network traffic and prevent attackers’ lateral movements.

In the Internal Firewalls for Dummies Guide, you’ll learn:

The different types of network traffic and the firewall types that protect them
How distributed internal firewalls combine the best of hardware-based enterprise e ...

View report