December 18, 2017 Visa Study: Consumers Want Biometric Authentication, Not Passwords 2 min read - A recent Visa study found that U.S. consumers prefer biometric authentication methods to traditional passwords, and even believe them to be more secure.
Identity & Access December 14, 2017 Secure Your Business Silently With Unified Identity and Access Management 3 min read - Unified identity and access management solutions from IBM enable security teams to silently protect their networks without disrupting the user experience.
Identity & Access December 6, 2017 Teaming Up to Overhaul Authentication 2 min read - IBM is partnering with leading authentication providers to make it easier to integrate new authentication technologies with IBM Security Access Manager.
Identity & Access December 4, 2017 Let Silent Security Drive Your Identity and Access Management 3 min read - IBM Identity and Access Management (IAM) solutions deliver silent security, which enables analysts to protect your identity by monitoring behavioral data.
Identity & Access December 1, 2017 Improving Decision-Making in User Access Review and Cleanup Projects 6 min read - Machine learning algorithms can help security teams improve decision-making while conducting user access review and cleanup projects.
Advanced Threats November 28, 2017 Traveling This Holiday Season? Beware of RFID Attacks 7 min read - Consumers traveling during the holiday season should be aware of RFID attacks that could enable thieves to control their hotel key cards and digital locks.
November 9, 2017 Privileged Account Management Remains Problematic 2 min read - Companies that neglect basic security best practices are grappling with problems related to privileged account management, according to a recent survey.
Identity & Access November 7, 2017 Access Management Resolution: Consolidating Actionable Access Data on a Single Pane of Glass 3 min read - Using several disparate tools for access management can create a fractured view of access data, decrease productivity and promote insecure behaviors.
Energy & Utility October 30, 2017 Addressing the Clear and Present Danger of an Electrical Power Grid Breach 4 min read - Government agencies and companies in the energy and utilities sector must replace legacy equipment to avoid a potentially devastating power grid breach.
October 27, 2017 Future-Proof Your Access Management With Single Sign-On: A Lesson From Luxembourg 2 min read - Security professionals need an identity and access management solution that delivers single sign-on capabilities and can adapt to business change.