Six ways by which hackers can crack your password

The password is one of the frontiers that stands between you and your hacked bank account or social media account. Nowadays even losing social media accounts to cybercriminals can cause a huge monetary loss because some bank accounts are linked to online accounts like Gmail, Yahoo, Facebook or Twitter. There are specific ways and means […]

Identity management to-do list aligns with cybersecurity

Read why Jon Oltsik says that identity management and cyber security are intertwined on CSO Online : My colleague Mark Bowker just completed some comprehensive research on identity and access management (IAM) challenges, plans and strategies at enterprise organizations. As a cybersecurity professional, I welcome this data. Identity management should be a major component of an […]

iPhone X gets facial authentication, is the enterprise next?

Read why Ryan Zlockie says that enterprises can use iPhone X’s facial authentication on Help Net Security : This week, Apple debuted the iPhone X which kills the Touch ID fingerprint scanner in favor of a 3D facial scanning technology called FaceID. Soon, iPhone users will depend on face recognition in order to check email, […]

Deloitte breach underlines need for better authentication

Cyber attackers have reportedly compromised Deloitte’s global email server through an administrator’s account, giving them unrestricted access to emails and attachments. Read why the hack attack on Deloitte’s global email servers hold lessons for businesses to have proper authentication management system in place on Computer Weekly.

Identity Verification Becomes Trickier in Wake of Equifax Breach

Read Robert Lemos’ article about why identity verification will become trickier after the massive Equifax data breach on eWeek : Security experts have long warned that legal identity verification should not just be linked to knowing four pieces of personal information: a person’s name, address, birth date and Social Security number. Read his full article here.

Identity management the new ‘perimeter’ for hospital cybersecurity

Read Bill Siwicki’s article about how identity management is the new perimeter for hospital cyber security on Healthcare IT News : Protecting a hospital network’s perimeter used to be the guiding principle for security professionals, but today they must focus more on managing the identities of every user, said John Houston, vice president of information security […]

Securing the Digital Economy With Federated Identity Management

Read Marko Tmusic’s article about how to secure businesses with federated identity management system on Security Intelligence : As the global digital economy grows, the number of digital identities rises, and so does the need to protect and manage how personal information is collected, used and distributed. Managing digital identities is key in the online world […]

Is it OK to monitor privileged users?

Read Mathew Ravden take a look at whether it is OK for companies to spy on their privileged users on SC Magazine : It’s the billion-dollar question ‘du jour.’ Was Edward Snowden a villain or a hero?  He believed the U.S. government was abusing its powers by excessively monitoring its citizens. Some consider him a voice of […]

Why you should re-engineer your approach to Identity and Access Management

Read way Gabriel Wilson says that companies should re-engineer their approach to identity and access management on  IT Pro Portal : With the growing number of business applications and services moving to the cloud and the increase of mobile working, controlling and securing the access to data and applications is becoming more and more challenging. […]

Microsoft Execs: Identity, Threat Intelligence Driving Company’s Security Strategy

In November 2015, Microsoft shared the details of its $1B investment in a new integrated security strategy across its portfolio of products and services including Windows, Office, and Azure. The funds were allocated toward initiatives such as doubling the number of security executives and launching the Microsoft Enterprise Cybersecurity Group (ECG) and Cyber Defense Operations Center […]