Jeremy Grant, coordinator of the Better Identity Coalition, offers a progress report on the 3-year-old organization's efforts to help prevent breaches with better identity management.
Speech recognition has become a powerful tool for authenticating customers in a seamless manner, says Sekar Jaganathan, director of digital strategy at Malaysia’s Kenanga Investment Bank.
The SolarWinds supply chain attack should prompt federal agencies and others to rethink how they approach security issues - especially identity and access management, according to a breakdown of the attack presented this week by NIST and CISA.
The security firm Okta shook up the identity and access management market Wednesday by announcing a $6.5 billion deal to acquire the customer IAM technology supplier Auth0. Two other cybersecurity M&A deals were also announced this week.
New authentication models, including dynamic authorization and continuous authentication, that work well for consumers can be adopted for employees as well, says Thomas Malta, head of identity and access management at the Virginia-based Navy Federal Credit Union.
In this era of "work from anywhere," identity and access management solutions are challenged more than ever. What are the strategies and solutions recommended by top CEOs and CISOs in the cybersecurity sector? An expert panel weighs in.
To assist organizations with making actionable decisions on the adoption of contextually-aware platforms, Enterprise Management Associates (EMA) conducted primary, survey-based research on the current requirements, use, and outcomes of utilizing contextually-aware identity and access management (IAM) solutions.
The...
The CyberArk Blueprint Rapid Risk Reduction Playbook helps organizations quickly implement the most critical elements of the CyberArk Blueprint to rapidly strengthen security and reduce risk. This paper reviews the CyberArk Blueprint and explains how the Rapid Risk Reduction Playbook can help jumpstart your privileged...
Single Sign-On (SSO) solutions are instrumental in controlling employee access to applications and systems. With SSO, companies leverage a central identity provider to manage user authentication and grant access to resources through a single set of login credentials. This enables organizations to improve security...
The SolarWinds supply chain attack is another example of the damage that lateral movement by system intruders can cause. Tim Keeler of Remediant describes why detecting lateral movement is so challenging.
The average employee actively uses 36 cloud services at work. They want technology to be fast, convenient, and easy to use, and they’ll seek it out themselves if it isn’t already available. 77% of employees use a 3rd-party cloud app without the approval or knowledge of IT.
When it comes to SMBs, how might they...
Identity and access management (IAM) securely connects employees to the business resources required to be productive. With the sudden shift to remote work, were businesses prepared to empower their employees to securely work from anywhere?
View this infographic to answer the following questions:
How critical is...
The onslaught of account takeover attacks from insecure passwords is driving the rapid adoption of passwordless solutions. While the risk reduction benefits are substantial, eliminating passwords is just the first step on the path to fundamentally strong authentication. In the “new normal” era of work from...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.