Financial services organizations today face extraordinary challenges in a dynamic, complex landscape. During the past two decades, the financial services sector has seen everything from increasing cybersecurity threats, data breaches and cyberattacks to intensified regulatory compliance, an acceleration of digital...
Emerging passwordless security standards, elevated consumer and consumer-like experience expectations, and ballooning costs have moved eliminating passwords from a theoretical concept to a real possibility. In this whitepaper, we will explore the case for going passwordless for both customer and employee...
According to Unisys, we are witnessing in real time the long anticipated end of the VPN and firewalls. In a virtual roundtable preview, Jack Koons of Unisys explains the shift to data over infrastructure for cybersecurity.
Too many enterprises remain chained to outdated and vulnerable identity and access management technologies - legacy systems that rely on passwords, eat budgets and kill productivity. Baber Amin of Ping Identity and Cody Cook of ProofID preview a new virtual roundtable on Modern IAM.
The world has experienced an unprecedented business disruption that instantly created the largest remote workforce - and largest attack surface - in history. How do you validate users and access in this new dynamic workforce? RSA's Steve Schlarman and Ben Smith preview an upcoming series of virtual roundtables.
Within weeks of the California Consumer Privacy Act of 2018 going into effect, the first CCPA lawsuit was filed in U.S. District Court in Northern California, based on a personal data breach of a retailer and its cloud service provider. Since then, many lawsuits have been filed, addressing multiple aspects of...
Every team building a mobile or app has a choice to make: build the whole app from scratch or find and use a pre-built option to A third-party customer identity and access management (CIAM) solution is another such service. A digital identity layer comprised of APIs, SDKs, and out-of-the-box customizable components...
"Passwordless authentication" is one of the hot cybersecurity topics, but who's actually implemented it - and how? Jeff Carpenter of HID Global discusses the business benefits and the future of passwordless authentication.
Carpenter, the director of identity and access management solutions at HID Global, starts with...
The COVID-19 pandemic caught many global enterprises by surprise. But as they prepare to emerge from quarantine and reopen their doors, they are taking a thoughtful approach to bolstering cybersecurity for on-premise and remote workers alike. Pamela Kubiatowski of Zscaler shares insights.
What does workforce authentication look like today? And as this remote workforce becomes the norm, how do you envision workforce authentication in five years? These are the questions posed by Jeff Carpenter of HID Global in an upcoming roundtable discussion.
In honor of World Password Day, here's a task for every organization that uses remote desktop protocol: Ensure that all of your organization's internet-facing RDP ports have a password - and that it's complex and unique.
Over the course of three days, ISMG and SecureAuth teamed up for a series of virtual roundtable discussions on the future of identity security. Bil Harmer of SecureAuth reflects on these discussions and how they inform his view of the factors influencing both the present and future of identity.
Employees and customers don't care where the application or resource they need access to is located, or what different mechanisms are required to ensure security and privacy. They just want access to be intuitive and trustworthy. Developers need simple hooks into the solutions they are building to allow them to...
The latest edition of the ISMG Security Report analyzes the privacy issues raised by COVID-19 contact-tracing apps. Also featured: An update on efforts to fight fraud tied to economic stimulus payments; John Kindervag on the origins of "zero trust."
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.