Identity & Access August 15, 2017 The Anatomy of an Identity Governance and Administration Disaster 4 min read - Many companies fail to maximize their identity governance and administration tools because they focus on short-term solutions to long-term problems.
Identity & Access August 9, 2017 The Untapped Potential of Two-Factor Authentication 3 min read - Two-factor authentication methods are more secure than passwords alone but require widespread adoption to be universally effective.
Identity & Access July 31, 2017 Why Is Identity Governance So Difficult to Get Right? 3 min read - To maximize the value of identity governance, organizations should tailor their IAM programs to suit business needs and priorities.
Cloud Security July 28, 2017 Is Cloud Security a Safe Bet for Highly Sensitive Government Data? 3 min read - Given the sensitivity of data and the rising volume of cyberattacks across the globe, government agencies have deep concerns about cloud security.
Identity & Access July 25, 2017 Administrator Credentials: A Security Breach Waiting to Happen 2 min read - If access is not properly secured, cybercriminals can use weak administrator credentials to take control over corporate networks.
Cloud Security July 24, 2017 Who Is Responsible for Cloud Security? 4 min read - Cloud security must be a team effort between providers and customers. The distribution of responsibility depends on the cloud model.
Cloud Security July 20, 2017 Cloud Security Is Not an Either/Or 2 min read - Cloud security is neither a magic bullet for analysts, nor a particularly vulnerable target for cybercriminals. It all depends on the effort you put in.
Application Security July 11, 2017 The Promise of a Unified App Catalog for the Enterprise 4 min read - A unified app catalog can help IT leaders properly manage the mobile workforce and secure disparate applications running on different operating systems.
Identity & Access July 5, 2017 Current Trends in Identity and Access Management: July 2017 7 min read - At the midpoint of 2017, five trends are emerging in identity and access management, and with these waves comes an opportunity for security teams.
Identity & Access June 13, 2017 Digital Transformation Means Infusing Identity Everywhere 3 min read - A secure digital transformation requires IDaaS solutions that enable IT to support business mandates without compromising the user experience.