Fraud Protection April 4, 2017 Trust, but Verify: Authentication Without Validation Is Naïve 3 min read - Fraudsters have rendered traditional authentication factors — something you know, something you have and something you are — ineffective.
Identity & Access March 30, 2017 Shakespeare, the Wizard of Oz and Multifactor Authentication 2 min read - Multifactor authentication, a critical component of identity and access management, has been described in literature since Shakespeare's time.
Cloud Security March 22, 2017 Securing Your Cloud-Based Resources: Start With These Four Areas 3 min read - With cloud-based resources becoming an integral part of the enterprise, it's time for security leaders to recognize the best ways to protect these assets.
Identity & Access March 17, 2017 Your Cybercriminal Has an Image Problem 2 min read - The classic image of the Hollywood hacker is misleading. The typical cybercriminal is more likely to be a state-sponsored actor or malicious insider.
Identity & Access March 17, 2017 Identity and Access Governance: Lessons From the Front Line 3 min read - Identity and access governance is not a technology project — it's a business transformation program. Organizationwide buy in is critical.
Healthcare March 16, 2017 Health Care Providers Need to Comply With HIPAA Regulations and Address These Five Critical Security Issues 3 min read - Health care organizations must address these five major cybersecurity concerns to comply with HIPAA regulations and ensure proper handling of patient data.
Identity & Access March 9, 2017 Five Steps to Propel Your Privileged Identity Management Strategy to the Next Level 2 min read - Privileged accounts are among the juiciest targets for fraudsters. Follow these five simple steps to become a privileged identity management pro.
Identity & Access March 7, 2017 Reimagining the Future of Identity Management With Blockchain 4 min read - It's time for organizations to adopt blockchain to centralize identity management and establish trust between parties involved in business transactions.
Identity & Access March 3, 2017 Abuse of Privileges: Common Barriers to Managing Privileged Accounts 2 min read - Companies often face challenges related to shared IDs, third-party access, regulatory compliance and privilege creep when managing privileged accounts.
Identity & Access February 23, 2017 Gartner IAM Summit London 2017: Your Guide to the Swag and Must-Attend Sessions 2 min read - At this year's Gartner IAM Summit, attendees will learn how to leverage IAM-as-a-service and actionable intelligence to prevent insider attacks and more.