In today's markets, customer identities and the personal data associated with them are among the most critical and valuable assets of any enterprise. Managing these digital identities from first registration and login to the later stages of the customer relationship and extracting business value from the associated...
More organizations are applying a highly automated "zero trust" model to ensure that they only give the right amount of privilege to the right user for the right amount of time, says Markku Rossi, CTO of SSH Communications Security.
The decline of the network perimeter as the cornerstone of enterprise cybersecurity means that CIOs and CISOs are increasingly focusing on identity to ensure that only the right people connect to systems, says Okta's Clare Cunniffe.
Government agencies and private sector organizations around the world are experimenting with the use of blockchain to help manage digital identity. Here are three examples of pioneering efforts in the U.S., Canada and India.
Cybercrime marketplaces Genesis and Richlogs are helping fraudsters to better impersonate legitimate users of banks, eBay, Amazon, Netflix and more by providing them with victims' legitimate "digital fingerprints" and replay tools designed to fool anti-fraud defenses.
As the healthcare industry undergoes its own digital transformation, security is more important than ever. Okta's Nick Fisher says a zero trust model can keep hospitals and patients healthy when it comes to protecting their data.
What are some of the moves that organizations can make to improve their identity and access management? Veda Sankepally, an IT security manager at managed care company Molina Healthcare, describes critical steps in this case study interview.
An overwhelming 92% of businesses are experiencing identity challenges, from lack of resources to lack of security experience. The biggest challenge? Balancing ease of use for employees with increased security for the business. These two goals are critical, yet always at odds. How can IT securely manage users - their...
IT and security professionals are juggling more responsibilities than ever before. Whether it's network maintenance or managing and securing employee identities - maximizing security and productivity with IAM solutions is essential. Especially when organizations may not have the resources they need.
Download this...
Today's business environment is anything but simple. The always-connected and on-the-go workforce is demanding more flexibility in working whenever, wherever, and on any device. In short, organizations are constantly faced with managing and connecting more devices, applications, networks, and users. It's no wonder...
Mergers and acquisitions, along with cloud adoption, are rapidly changing the pharmaceutical industry. Sandy Dalal of Allergan talks about how Okta identity and access management brings security stability and supports a zero trust framework.
The promise of an integrated identity and risk platform that continuously monitors a myriad of suspicious activities across channels and applications, and dynamically orchestrates authentication and authorization actions has been around for over a decade. Many organizations and technology vendors have attempted to...
Ensuring your employees have the right level of access to their work, and nothing more has never been easy. It's even more challenging now for IT to ensure that a user is who they say they are with users bringing more apps, devices, and networks into the workplace. Combining access and authentication solutions to one...
A major misconception about cloud IAM is that it's easy to implement, says Mark Perry, CTO for APAC at Ping Identity. Implementation poses challenges, and cloud IAM must be carefully integrated with other systems, he says.
More often than not, technical aspects of data breaches are the centerpiece of any response - but its actually the non-technical aspects that are even more threatening and usually overlooked. Powerful tools such as identity are critical in bolstering your defenses - and the untapped market potential is consistently...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.