identity management
4 things you can do to minimize cyberattacks on supply and value chains
Supply chain attacks target the weakest spot in most every enterprise’s security program: third-party access. The SolarWinds hack was a classic supply chain attack, …
Hybrid IAM: Addressing the security and experience issues caused by hybrid IT
More than 80% of global IT decision-makers have already adopted, or plan to adopt or expand, cloud-based identity and access management (IAM) initiatives over the next two …
As DX acceleration continues, identity and zero trust need to be central in all business decisions
The pandemic-driven shift to remote work has significantly changed how companies are investing in identity and access management capabilities and zero trust security, …
A strategic approach to identity verification helps combat financial crime
70% of financial services organizations are taking a strategic approach to identity verification to combat financial crime and stay one step ahead of fraudsters according to …
Marry IGA with ITSM to avoid the pitfalls of Identity 2.0
Identity 2.0 vendors are about to face a reckoning. For too long, they’ve focused solely on compliance and missed the mark on the adaptability, automation and integration that …
Zero trust: A solution to many cybersecurity problems
The SolarWinds hack and the never-ending stream of revelations about the attackers’ tools, techniques and other targets has been occupying the minds of CISOs and …
Rethinking Active Directory security
In the wake of a cyberattack, Active Directory is sometimes dismissed as just another service that needs to be recovered, and security is an afterthought. But the hard reality …
Migration delays prevent AD-centric zero trust security framework adoption
37 percent of IT professionals rated rapid changes in their AD/AAD environment as the key impact of COVID-19 on their organization’s identity management team, a One Identity …
Banks risk losing customers with anti-fraud practices
Many banks across the U.S. and Canada are failing to meet their customers’ online identity fraud and digital banking needs, according to a survey from FICO. Despite COVID-19 …
CIOs prioritizing IAM over endpoint security and security awareness training
CIOs are prioritizing identity and access management (IAM) over endpoint security and security awareness training in 2020, according to a Hitachi ID survey. The survey, …
How do industry verticals shape IAM priorities?
IAM priorities differ by industry vertical, and a one-size-fits-all approach to IAM doesn’t work when every industry and business within that industry is unique, according to …
Looking at the future of identity access management (IAM)
Here we are: at the beginning of a new year and the start of another decade. In many ways, technology is exceeding what we expected by 2020, and in other ways, well, it is …
Featured news
Sponsored
Don't miss
- Exposed: Russian military Unit 29155 does digital sabotage, espionage
- Apache OFBiz team patches critical RCE vulnerability (CVE-2024-45195)
- September 2024 Patch Tuesday forecast: Downgrade is the new exploit
- Human firewalls are essential to keeping SaaS environments safe
- Respotter: Open-source Responder honeypot