Identity & Access April 13, 2017 IDaaS Market Leader News: IBM Cloud Identity Service Named Market Leader in IDaaS 3 min read - Analyst firm Ovum recognized IBM Cloud Identity Service as an IDaaS market leader for the breadth and depth of its IAM capabilities.
Data Protection April 12, 2017 Protect Your Twitter Account or Face Serious Security Consequences 3 min read - It's crucial to protect your Twitter account to avoid exposing yourself or your business to financial, reputational and legal consequences.
Fraud Protection April 4, 2017 Trust, but Verify: Authentication Without Validation Is Naïve 3 min read - Fraudsters have rendered traditional authentication factors — something you know, something you have and something you are — ineffective.
Identity & Access March 30, 2017 Shakespeare, the Wizard of Oz and Multifactor Authentication 2 min read - Multifactor authentication, a critical component of identity and access management, has been described in literature since Shakespeare's time.
Cloud Security March 22, 2017 Securing Your Cloud-Based Resources: Start With These Four Areas 3 min read - With cloud-based resources becoming an integral part of the enterprise, it's time for security leaders to recognize the best ways to protect these assets.
Identity & Access March 17, 2017 Your Cybercriminal Has an Image Problem 2 min read - The classic image of the Hollywood hacker is misleading. The typical cybercriminal is more likely to be a state-sponsored actor or malicious insider.
Identity & Access March 17, 2017 Identity and Access Governance: Lessons From the Front Line 3 min read - Identity and access governance is not a technology project — it's a business transformation program. Organizationwide buy in is critical.
Healthcare March 16, 2017 Health Care Providers Need to Comply With HIPAA Regulations and Address These Five Critical Security Issues 3 min read - Health care organizations must address these five major cybersecurity concerns to comply with HIPAA regulations and ensure proper handling of patient data.
Identity & Access March 9, 2017 Five Steps to Propel Your Privileged Identity Management Strategy to the Next Level 2 min read - Privileged accounts are among the juiciest targets for fraudsters. Follow these five simple steps to become a privileged identity management pro.
Identity & Access March 7, 2017 Reimagining the Future of Identity Management With Blockchain 4 min read - It's time for organizations to adopt blockchain to centralize identity management and establish trust between parties involved in business transactions.