Over the course of three days, ISMG and SecureAuth teamed up for a series of virtual roundtable discussions on the future of identity security. Bil Harmer of SecureAuth reflects on these discussions and how they inform his view of the factors influencing both the present and future of identity.
The latest edition of the ISMG Security Report analyzes the rising costs of ransomware attacks and the latest victims. Also featured: An assessment of Australia's new contact-tracing app designed to help battle the spread of COVID-19, and a discussion of applying the "zero trust" model to the remote workforce.
The global pandemic has revealed a lot about the extended remote workforce and its haves and have-nots, says Mike Kiser of SailPoint Technologies. In a preview of an upcoming virtual roundtable, he describes the cybersecurity forces shaping the new post-crisis workforce.
Expectations of online businesses have never been higher. Customers expect frictionless and personalized experiences, while demanding evermore streamlined registration processes. And if they don't get them, they'll take their business elsewhere.
Resultantly, businesses are experiencing a profound tension. How do you...
Enterprises long have practiced workforce identity and access management, but increasingly they are rolling out customer IAM, or CIAM. What's driving the trend, and where should cybersecurity leaders look to assert influence? Keith Casey of Okta explores some CIAM myths and realities.
Given the number and severity of data breaches due to compromised credentials, multi-factor authentication is no longer optional. But is traditional MFA enough? Advanced Authentication goes beyond traditional MFA and provides flexible options to meet your organisation's needs.
Read to learn:
The criteria to use in...
With a global remote workforce, the concept of secure identity has never been more critical. What is the present and future of identity? In a preview of an upcoming virtual roundtable discussion, SecureAuth's Bil Harmer shares his vision.
AI meeting assistants present increasing risks as more companies rely on teleconferencing during the COVID-19 pandemic, says U.K.-based Steve Marshall, CISO at Bytes Technology, an IT and cybersecurity consultancy, who discusses risk mitigation steps.
Cloud may no longer be a buzzword, but AIOps still is. This needs to change, now more than ever, as operations can no longer be run at an analog speed. Most of today's digital transformation projects demand a pace, scale and volume of data generation that IT Operations just can't manage without the help of AI and...
In today's zero trust world, users need to continuously prove their digital identity in a way which is convenient and usable.
View this infographic to assure the digital identity of employees, customers, and partners to protect networks, applications, and data.
Reeling from continued security breaches due to compromised static passwords; institutions are actively searching for authentication alternatives. In response, a broad array of new approaches to authentication have flooded the market. Yet, most organisations still have not found an acceptable substitute.
Full protection requires organisations to eliminate their dependence on the ability of humans to adhere to complex authentication policies.
Read this guide to learn how your organisation can:
Leverage your existing Microsoft expertise;
Precisely match your risk exposure to the optimal security posture for your...
Cybercrimes, and the reputational and financial damage to businesses that suffer from them, rise every year. It's estimated that the cost of breaches, identity theft, and other cybercrimes will double, from $3 trillion in 2015 to $6 trillion in 2021. Advanced authentication prevents 70% of account fraud, meaning that...
How to Protect Against High Risk File Uploads & Transfers Across Critical Digital Channels
Today's digitized business processes have opened the door for more efficient operations, greater self service, and an optimized user experience. But they also expose the organization to new risks as external data enters the...
Zero Trust has become a cybersecurity marketing buzzword. But Kelsey Nelson of Okta sheds light on the realities of the Zero Trust approach, with a specific focus on the identity and access management component of the strategy.