iPhone X gets facial authentication, is the enterprise next?

Read why Ryan Zlockie says that enterprises can use iPhone X’s facial authentication on Help Net Security : This week, Apple debuted the iPhone X which kills the Touch ID fingerprint scanner in favor of a 3D facial scanning technology called FaceID. Soon, iPhone users will depend on face recognition in order to check email, […]

Deloitte breach underlines need for better authentication

Cyber attackers have reportedly compromised Deloitte’s global email server through an administrator’s account, giving them unrestricted access to emails and attachments. Read why the hack attack on Deloitte’s global email servers hold lessons for businesses to have proper authentication management system in place on Computer Weekly.

Identity Verification Becomes Trickier in Wake of Equifax Breach

Read Robert Lemos’ article about why identity verification will become trickier after the massive Equifax data breach on eWeek : Security experts have long warned that legal identity verification should not just be linked to knowing four pieces of personal information: a person’s name, address, birth date and Social Security number. Read his full article here.

Identity management the new ‘perimeter’ for hospital cybersecurity

Read Bill Siwicki’s article about how identity management is the new perimeter for hospital cyber security on Healthcare IT News : Protecting a hospital network’s perimeter used to be the guiding principle for security professionals, but today they must focus more on managing the identities of every user, said John Houston, vice president of information security […]

Securing the Digital Economy With Federated Identity Management

Read Marko Tmusic’s article about how to secure businesses with federated identity management system on Security Intelligence : As the global digital economy grows, the number of digital identities rises, and so does the need to protect and manage how personal information is collected, used and distributed. Managing digital identities is key in the online world […]

Is it OK to monitor privileged users?

Read Mathew Ravden take a look at whether it is OK for companies to spy on their privileged users on SC Magazine : It’s the billion-dollar question ‘du jour.’ Was Edward Snowden a villain or a hero?  He believed the U.S. government was abusing its powers by excessively monitoring its citizens. Some consider him a voice of […]

Why you should re-engineer your approach to Identity and Access Management

Read way Gabriel Wilson says that companies should re-engineer their approach to identity and access management on  IT Pro Portal : With the growing number of business applications and services moving to the cloud and the increase of mobile working, controlling and securing the access to data and applications is becoming more and more challenging. […]

Microsoft Execs: Identity, Threat Intelligence Driving Company’s Security Strategy

In November 2015, Microsoft shared the details of its $1B investment in a new integrated security strategy across its portfolio of products and services including Windows, Office, and Azure. The funds were allocated toward initiatives such as doubling the number of security executives and launching the Microsoft Enterprise Cybersecurity Group (ECG) and Cyber Defense Operations Center […]

Context is Key to Identity and Access Management When Securing a Mobile Workforce

Read why Richard Walters says that context is the key to identity and access management when security a mobile platform workforce on Information Security Buzz : As the workforce becomes more mobile and more critical enterprise applications are hosted in the cloud, identity and access management (IAM) grows increasingly important to help assure secure remote […]

2016 Identity & Access Management Study

According to Verizon’s latest Data Breach Investigations study, more than 60 percent of the most recent breaches resulted from default, stolen or weak passwords. And most of the high-profile breaches of recent times – Target, JPMorgan Chase, Anthem to name a few – were caused by a breach of privileged access. What is your organization […]