Identity & Access October 5, 2015 A Progress Report on FIDO Authentication 2 min read - The Fast Identity Online (FIDO) Alliance is dedicated to improving authentication standards across industries and applications.
Fraud Protection September 24, 2015 Authentication: The Enterprise’s Weakest Link 3 min read - Many organizations struggle to find the right authentication methods for their employees and needs, but they can ill afford to let malpractice continue.
Identity & Access August 19, 2015 Winning the Battle Against Insider Threats 2 min read - Insider threats may be one of the biggest risks facing your organization today, yet they often fly under the radar when it comes to risk management.
Identity & Access August 6, 2015 Make More Room on the Trophy Shelf: IBM Wins 2015 IAM Leadership Award 2 min read - Frost & Sullivan recently bestowed IBM with its 2015 Global Leadership Award, recognizing IBM's security portfolio for its IAM services.
CISO July 27, 2015 Mobile Security: Look Beyond the Device 2 min read - An enterprise-wide mobile security framework needs to protect devices and data, all while ensuring compliance and managing access, as well.
Identity & Access July 22, 2015 They Came From Outer Space: What Sci-Fi Movies Can Teach Us About IAM Security 2 min read - IAM tools can provide a way to apply security intelligence, behavioral analytics and SIEM tools to the complex world of user management.
July 20, 2015 Breaking Up, Breaking In? Sensitive Data and the Ex-Employee 3 min read - Ex-employees aren't always cut off from corporate networks. How do companies ensure sensitive data is protected when users leave the fold?
Identity & Access July 20, 2015 Remember to Lock the Front Door With Identity Governance 2 min read - The right identity governance solution can help organizations reduce audit risk, prevent toxic duty combinations and certify access to users.
Endpoint June 22, 2015 IBM Named Leader in 2015 Gartner Magic Quadrant for Enterprise Mobility Management Suites 3 min read - IBM has been recognized as a Leader in Gartner's Magic Quadrant for Enterprise Mobility Management Suites report, published in June 2015.
Risk Management June 19, 2015 Key Components of a High-Performing Information Risk Management Program 10 min read - Establishing a high-performing information risk management program requires efforts focused on risk identification, data protection and user behavior.