Artificial Intelligence June 26, 2019 Can Cybersecurity AI Prevent Attacks From the Inside Out? 3 min read - By building cybersecurity AI models around the life cycle of the user, organizations can start to outline patterns for normal behavior and detect patterns that seem abnormal.
Identity & Access June 24, 2019 Does Your Identity and Access Management Program Put People First? 4 min read - The secret to gaining user acceptance of an IAM solution is to design your identity and access management program from the ground up with the user experience in mind.
Endpoint June 19, 2019 Why Conditional Access Is Essential to Zero Trust Security 4 min read - With more devices outside the corporate perimeter and more apps stored in the public cloud, organizations must abandon on-premises security for new conditional access models to achieve zero trust.
Endpoint June 19, 2019 IoT Security and the Enterprise: A Practical Primer 5 min read - IoT security is now a hot topic, but beyond the hype and hyperbole, how can enterprises effectively secure connected networks and safeguard IoT devices?
CISO June 14, 2019 CISOs Still Aren’t Adopting Enterprisewide Multifactor Authentication — What’s the Holdup? 3 min read - Despite the myriad benefits of multifactor authentication (MFA), many CISOs are reluctant to implement it pervasively in their enterprise because they don't know what assets need to be protected.
Fraud Protection June 14, 2019 The Digital Identity Trust Life Cycle: Partnering for Fraud Prevention and Digital Trust 3 min read - Many industry experts recommend continuous risk authentication, but your security solution provider and its ability to innovate is just as crucial to your digital identity trust strategy.
Artificial Intelligence June 7, 2019 Have Your Virtual Assistant Call My Bot and We’ll Do Lunch: A Step Toward the Cognitive Enterprise 4 min read - In the near future, we're going to see the role of office power broker shift from an administrative assistant to a virtual assistant. How does the CISO's role change in this cognitive enterprise?
Identity & Access May 31, 2019 Why Privileged Access Management Must Be Part of Your Overall IAM Strategy 4 min read - When you implement a privileged access management solution as a standalone project, you will often face the same challenges that you had before you implemented it.
CISO May 27, 2019 Is Your Company Culture Seamlessly Secure — or Just Stressful? 4 min read - As security practitioners, we probably have a good grasp of technological controls. But adversarial company culture may be creating stress that keeps people from protecting our data.
Fraud Protection May 24, 2019 How Would You React? What ‘Killing Eve’ Can Teach Us About Social Engineering 5 min read - Social engineering will always be one of the easiest ways for threat actors to get what they want. So what can enterprises do to decrease the risk?