Accelerated digital transformation has only complicated the identity verification challenge for enterprises. But Chuck Moore of Early Warning says behavioral analytics and anomaly detection combined can reduce both fraud and the friction that can come with traditional authentication methods.
In the latest "Proof of Concept," Lisa Sotto, Jeremy Grant and ISMG editors discuss the significance of Apple, Google and Microsoft supporting the FIDO protocol's passwordless sign-in standard, progress made on Biden's cybersecurity executive order and updates on U.S. cybersecurity and privacy laws.
With zero trust and cloud infrastructures at the top of security practitioners' road maps, there has been an uptick in authorization-related initiatives. Security experts discuss the challenges of authorization and describe how firms can use authorization strategies to better protect themselves.
Identity experts urge the Biden administration to accelerate the deployment of mobile driver's licenses and ensure identity theft victims get direct assistance. These are among the four items experts say must be added to an upcoming executive order focused on preventing and detecting identity theft.
Private equity giant Thoma Bravo has agreed to purchase identity security powerhouse SailPoint for $6.9 billion in the sixth-biggest cybersecurity acquisition of all time. The deal will give SailPoint the flexibility needed to support its customers, expand its markets and accelerate innovation.
Keeping up with myriad data privacy and information security regulations has never been easy. Security mandates are complicated and constantly evolving. Adding to the complexity: organizations often face deadlines to meet compliance objectives – and fast.
Across industries and regions, compliance frameworks...
Expensive and destructive cyberattacks have become increasingly common for organizations of every size in every vertical, and the finance sector is particularly targeted. With the perimeter gone, we need to adopt a Zero Trust approach of assuming all access requests, including those from inside our network, are not to...
Okta says it should have notified customers of a breach earlier and that Lapsus$ compromised a laptop belonging to Sitel, a third-party customer support firm, via remote desktop protocol, enabling it to infiltrate Okta's network. Cybersecurity experts discuss the impact of the breach and offer mitigation advice.
In the coming weeks, U.S. President Joe Biden will announce a new executive order to prevent and detect identity theft involving public benefits. Jeremy Grant, coordinator of the Better Identity Coalition, discusses the challenges ahead for the government in combating criminal and identity fraud.
There is no successful digital business without utilizing digital identities. Digital identities of consumers, customers, business partners, employees, but also devices, things, or services are at the core of the digital business. Unfortunately, most digital identities reside in siloes. Building a modern identity...
After a merger or acquisition, integration of Identity and Access Management systems is one of the most pressing tasks for the IT team. For all the users, old and new, IT personnel need to give the right people the right access to the right resources, regardless of where the user’s identity is stored. When a large...
One of the world’s leading hotel chains has nearly two hundred thousand employees and 7000 locations across the globe. When the IT team was tasked with IAM modernization to enable the company’s digitization goals, they faced a complex challenge. See how they chose to simplify their existing identity infrastructure...
As Western cybersecurity officials warn that Russia's Ukraine invasion poses an elevated cybersecurity risk to all, kudos to Cloudflare, CrowdStrike and Ping Identity for offering free endpoint security and other defenses to the healthcare sector and power sectors, for at least four months.
Machine identity management has become a top priority as organizations evaluate new and alternative approaches to securing a growing, cloud-driven, distributed environment. Digitization has led to massive growth in machines or digital assets, opening up a vast attack surface. Securing these distributed assets and...
Implementing a comprehensive identity security program might
be described as a Holy Grail. But what does it mean to reduce the
complexity for organizations and their employees?
Download this master compendium that highlights key topics around:
Modernizing Identity & Access Management
Identity & the new role of...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.