Identity & Access September 26, 2018 Protect Your ‘Matrix’ With Strong Privileged Access Management 5 min read - "The Matrix" shows the damage that a rogue actor can cause by gaining privileged access to a digital environment. Privileged access management tools can help security teams keep their networks secure.
Risk Management February 26, 2018 Building Resilience Against Evolving Technology: An Interview With a Cyber Risk Expert 6 min read - According to IBM cyber risk expert Tim Roberts, security professionals must do a better job of communicating with top management as the technology landscape evolves and new threats emerge.
November 14, 2017 Mind the Gap With IBM Data Risk Manager: The Data Risk Security Platform for the C-Suite 3 min read - Our sensitive data is exposed to more internal and external threats, heightening the data risk more than ever before.
Identity & Access September 7, 2017 Security Specialists Discuss Identity and Access Management in the Age of Ransomware 7 min read - Security teams should follow identity and access management (IAM) best practices to avoid widespread ransomware attacks such as WannaCry and NotPetya.
Security Services March 14, 2017 And Don’t Be Falling in Love as Security Services Experts Are Walking Away 3 min read - Security professionals and enthusiasts will have many opportunities to connect with security services experts at IBM InterConnect 2017.
Identity & Access December 5, 2016 Security Starts With People: Three Steps to Build a Strong Insider Threat Protection Program 3 min read - To protect their organizations from an insider threat, IT managers should take steps to reduce exposure of data and enhance detection capabilities.
Identity & Access November 29, 2016 Security Starts With People: Know Who They Are, Know What They Do 3 min read - Technology is great, but security starts with people. The best way to prevent a data breach is to know the people in your organization.
Identity & Access September 7, 2016 What’s Wrong With SMS Authentication? Two IBM Experts Weigh In on the NIST Recommendation 4 min read - IBM experts Dustin Hoff and Ashish Malhotra discussed ways for businesses and end users to mitigate security issues stemming from SMS authentication.
Identity & Access August 19, 2016 Get the Identity Governance Scoop: Interview With an Expert 6 min read - To learn more about identity governance and intelligence, we interviewed Andy Taylor, one of IBM's identity and access management specialists.
Identity & Access July 25, 2016 May the Best IAM Program Win: Four Steps to Shoot for the Gold 4 min read - A mature IAM program optimized to a business's objectives and the unique circumstances surrounding it can minimize the risk of data breaches.
Identity & Access July 12, 2016 The Insider Threat: Are You at Risk? 4 min read - Some security red flags, such as the presence of shadow IT and weak authentication practices, could indicate a high risk for an insider threat.