Modern enterprises are large and complex - and so are their IT environments. How does this complexity translate to securing access in hybrid environments? Frederico Hakamine of Okta breaks down the challenge and discusses solutions.
The global pandemic has revealed a lot about the extended remote workforce and its haves and have-nots, says Mike Kiser of SailPoint Technologies. In a preview of an upcoming virtual roundtable, he describes the cybersecurity forces shaping the new post-crisis workforce.
Expectations of online businesses have never been higher. Customers expect frictionless and personalized experiences, while demanding evermore streamlined registration processes. And if they don't get them, they'll take their business elsewhere.
Resultantly, businesses are experiencing a profound tension. How do you...
Enterprises long have practiced workforce identity and access management, but increasingly they are rolling out customer IAM, or CIAM. What's driving the trend, and where should cybersecurity leaders look to assert influence? Keith Casey of Okta explores some CIAM myths and realities.
Important criteria to consider when choosing an IAM vendor
Adopting multi-factor authentication prevents the most common attacks on corporate networks.
Advanced authentication goes a step further toward the higher security and greater convenience of a passwordless environment.
As organizations move to adopt...
With a global remote workforce, the concept of secure identity has never been more critical. What is the present and future of identity? In a preview of an upcoming virtual roundtable discussion, SecureAuth's Bil Harmer shares his vision.
Identity and access management for the workforce? Cybersecurity leaders are all over that. But what about customer IAM? There's plenty of room to grow there, judging by Dallas roundtable discussion featuring Richard Bird of Ping Identity and Gray Mitchell of IDMWORKS.
"Passwordless authentication" is one of the hot cybersecurity topics, but who's actually implemented it - and how? Jeff Carpenter of HID Global discusses the business benefits and the future of passwordless authentication.
AI meeting assistants present increasing risks as more companies rely on teleconferencing during the COVID-19 pandemic, says U.K.-based Steve Marshall, CISO at Bytes Technology, an IT and cybersecurity consultancy, who discusses risk mitigation steps.
How to Protect Against High Risk File Uploads & Transfers Across Critical Digital Channels
Today's digitized business processes have opened the door for more efficient operations, greater self service, and an optimized user experience. But they also expose the organization to new risks as external data enters the...
Are you confident that your business critical data is protected? According to the recent market research Global Data Protection Index conducted by Vanson Bourne, the volume of data being managed is growing at a phenomenal rate from 1.53PB in 2016 to 9.47PB in 2018 in EMEA - but organizations are struggling with...
Purpose-built backup appliances (PBBAs) have been foundational
components to many organizations' backup/recovery infrastructure for
more than a decade. The importance of PBBAs is illustrated in the
numbers: According to IDC, in 2018, the data replication and protection
(DR&P) market was approximately $8.9 billion,...
The data era is changing how organizations think about, monetize and protect data. The volume of data being managed is growing at a phenomenal rate from 1.45PB in 2016 to 9.70PB in 2018. Data loss costs nearly 2x more than unplanned systems downtime. However, some organizations are better equipped than others to...
Looking across high profile data breaches in the industry, it becomes clear that compromised credentials is the root cause in nearly every one. But there is hope. Across all of these challenges and realities, the common thread is identity. If we can take control of identity, we can turn the tides against data...
Poor and lost credentials are the leading cause of today's data breaches. This explosion of cloud and mobile technologies has dissolved the traditional perimeter, leaving people - and their identities - as the only remaining security control point.
Read this guide to learn how your organization can:
Ensure strong...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.