June 5, 2017 Facebook Highlights Two-Factor Authentication in Security Settings Redesign 2 min read - Facebook is hoping to make improving security settings easier for users with two-factor authentication and redesigned menu navigation.
Data Protection April 12, 2017 Protect Your Twitter Account or Face Serious Security Consequences 3 min read - It's crucial to protect your Twitter account to avoid exposing yourself or your business to financial, reputational and legal consequences.
Identity & Access March 3, 2017 Abuse of Privileges: Common Barriers to Managing Privileged Accounts 2 min read - Companies often face challenges related to shared IDs, third-party access, regulatory compliance and privilege creep when managing privileged accounts.
Endpoint February 3, 2017 The Zero Trust Model for Living in a Hacked World 3 min read - The zero trust model requires IT managers to abandon the "trust but verify" concept and manage user access according to a strategy of least privilege.
Intelligence & Analytics January 16, 2017 The Holes in Your Knows 2 min read - Eliminate holes in your knows by monitoring all privileged access and tying any questionable activity to auditable executions.
Identity & Access January 12, 2017 IP Theft: How Often Does Your IP Walk Out the Door? 3 min read - Outgoing employees are motivated by revenge, greed and resentment to abscond with valuable data. A robust exit process is the key to preventing IP theft.
Identity & Access December 14, 2016 How Can You Quantify the Value of Web Access Enforcement? 8 min read - Each business is responsible for establishing its own system for evaluating web access enforcement based on the particular needs of the organization.
Identity & Access December 5, 2016 Security Starts With People: Three Steps to Build a Strong Insider Threat Protection Program 3 min read - To protect their organizations from an insider threat, IT managers should take steps to reduce exposure of data and enhance detection capabilities.
Identity & Access November 28, 2016 Access Management Resolution in the Digital Era 2 min read - As organizations continue to embrace the digital era and cloud services, it's more important than ever to find an access management resolution.
Identity & Access October 26, 2016 Clearing the Fog: Defining the Fundamental IAM Domains 5 min read - The use of identity and access management is widespread, but the IT industry still lacks a consistent set of definitions for the fundamental IAM domains.