Artificial Intelligence October 19, 2015 How Cognitive Computing Supports Identity and Access Management 2 min read - The identity governance of tomorrow looks quite different from today, largely thanks to the rise of special technologies such as cognitive computing.
Identity & Access October 13, 2015 Who’s Watching the Front Door? 3 min read - A strong, centralized, intelligent access management solution can help slam the front door on attackers before they creep into enterprise networks.
Identity & Access October 5, 2015 A Progress Report on FIDO Authentication 2 min read - The Fast Identity Online (FIDO) Alliance is dedicated to improving authentication standards across industries and applications.
Fraud Protection September 24, 2015 Authentication: The Enterprise’s Weakest Link 3 min read - Many organizations struggle to find the right authentication methods for their employees and needs, but they can ill afford to let malpractice continue.
Identity & Access August 19, 2015 Winning the Battle Against Insider Threats 2 min read - Insider threats may be one of the biggest risks facing your organization today, yet they often fly under the radar when it comes to risk management.
Identity & Access August 6, 2015 Make More Room on the Trophy Shelf: IBM Wins 2015 IAM Leadership Award 2 min read - Frost & Sullivan recently bestowed IBM with its 2015 Global Leadership Award, recognizing IBM's security portfolio for its IAM services.
CISO July 27, 2015 Mobile Security: Look Beyond the Device 2 min read - An enterprise-wide mobile security framework needs to protect devices and data, all while ensuring compliance and managing access, as well.
Identity & Access July 22, 2015 They Came From Outer Space: What Sci-Fi Movies Can Teach Us About IAM Security 2 min read - IAM tools can provide a way to apply security intelligence, behavioral analytics and SIEM tools to the complex world of user management.
July 20, 2015 Breaking Up, Breaking In? Sensitive Data and the Ex-Employee 3 min read - Ex-employees aren't always cut off from corporate networks. How do companies ensure sensitive data is protected when users leave the fold?
Identity & Access July 20, 2015 Remember to Lock the Front Door With Identity Governance 2 min read - The right identity governance solution can help organizations reduce audit risk, prevent toxic duty combinations and certify access to users.