Identity & Access August 3, 2017 IBM Scores a Strong Performer Placement in Risk-Based Authentication Wave 2 min read - IBM was recognized as a Strong Performer in "The Forrester Wave: Risk Based Authentication, Q3 2017," earning the highest possible score in two categories.
Cloud Security July 20, 2017 Cloud Security Is Not an Either/Or 2 min read - Cloud security is neither a magic bullet for analysts, nor a particularly vulnerable target for cybercriminals. It all depends on the effort you put in.
Identity & Access June 7, 2017 The New NIST Digital Identity Guidelines and What They Mean to You 2 min read - With the most recent draft of its Digital Identity Guidelines, NIST revised many of its federal recommendations regarding passwords and access management.
May 4, 2017 The Password Problem: Poor Cyber Hygiene Letting Cybercriminals Clean Up 2 min read - The continued reuse of weak credentials within the enterprise has allowed fraudsters to clean up their acts. World Password Day reminds us to do the same.
Identity & Access April 14, 2017 Episode 007: One Small Sticky Note on a Password Wall, One Giant Leap for Security 3 min read - If you're writing down your passwords on adhesive notes or in a journal, you might need a refresher on password security best practices.
Data Protection April 12, 2017 Protect Your Twitter Account or Face Serious Security Consequences 3 min read - It's crucial to protect your Twitter account to avoid exposing yourself or your business to financial, reputational and legal consequences.
April 4, 2017 Security Professionals Leave Social Media Accounts Vulnerable, Survey Reveals 2 min read - Security professionals who fail to secure their social media accounts create openings for cybercriminals to access more critical, work-related data.
Fraud Protection April 4, 2017 Trust, but Verify: Authentication Without Validation Is Naïve 3 min read - Fraudsters have rendered traditional authentication factors — something you know, something you have and something you are — ineffective.
Identity & Access March 30, 2017 Shakespeare, the Wizard of Oz and Multifactor Authentication 2 min read - Multifactor authentication, a critical component of identity and access management, has been described in literature since Shakespeare's time.
Risk Management February 23, 2017 The Best Defense Is a Good Offense: The Value of User Education 2 min read - User education and online safety training can be invaluable weapons against cyberthreats, especially for IT teams that are short on resources.