9 Posts

Laurène Hummer

Global Portfolio Marketing for IAM Security Services, IBM Security

Laurène Hummer leads the global portfolio marketing efforts for Identity and Access Management (IAM) Services at IBM. She enjoys speaking to industry trends, technology breakthroughs, and customer needs. She holds an MBA and a chemical engineering degree from the University of Massachusetts at Amherst.

Written By Laurène Hummer

Mind the Gap With IBM Data Risk Manager: The Data Risk Security Platform for the C-Suite

Our sensitive data is exposed to more internal and external threats, heightening the data risk more than ever before.

Security Specialists Discuss Identity and Access Management in the Age of Ransomware

Security teams should follow identity and access management (IAM) best practices to avoid widespread ransomware attacks such as WannaCry and NotPetya.

And Don’t Be Falling in Love as Security Services Experts Are Walking Away

Security professionals and enthusiasts will have many opportunities to connect with security services experts at IBM InterConnect 2017.

Security Starts With People: Three Steps to Build a Strong Insider Threat Protection Program

To protect their organizations from an insider threat, IT managers should take steps to reduce exposure of data and enhance detection capabilities.

Security Starts With People: Know Who They Are, Know What They Do

Technology is great, but security starts with people. The best way to prevent a data breach is to know the people in your organization.

What’s Wrong With SMS Authentication? Two IBM Experts Weigh In on the NIST Recommendation

IBM experts Dustin Hoff and Ashish Malhotra discussed ways for businesses and end users to mitigate security issues stemming from SMS authentication.

Get the Identity Governance Scoop: Interview With an Expert

To learn more about identity governance and intelligence, we interviewed Andy Taylor, one of IBM's identity and access management specialists.

May the Best IAM Program Win: Four Steps to Shoot for the Gold

A mature IAM program optimized to a business's objectives and the unique circumstances surrounding it can minimize the risk of data breaches.

The Insider Threat: Are You at Risk?

Some security red flags, such as the presence of shadow IT and weak authentication practices, could indicate a high risk for an insider threat.