What Is Conditional Access, and Why Does It Matter to You?

Implementing conditional access procedures is a crucial part of a zero-trust strategy. But its fair to ask yourself, isn’t access always conditional? Isn’t access to systems and data always granted on the condition that, at a minimum, users enter a username and password? True enough. But the term “conditional access”…

Read More

More_eggs, Anyone? Threat Actor ITG08 Strikes Again

IBM X-Force Incident Response and Intelligence Services (IRIS) responds to security incidents across the globe. During a recent incident response investigation, our team identified new attacks by the financially motivated attack group ITG08, also known as FIN6. ITG08 is an organized cybercrime gang that has been active since 2015, mostly…

Read More