Identity and Access Management & Cybersecurity News | 6.14.18

Posted: 
Jun. 14th, 2018

cybersecurity consultants

Leopard Spots and Zebra Stripes: Big Data and Identity Management  

Carefully using big data to paint that bigger picture of users and their behaviors enables organizations to develop more sophisticated identification and access control mechanisms to protect their business, and ensure privacy. Deploying solutions that aggregate previously overlooked resources in a secure manner makes it easier for users to be authenticated and allowed access to systems – which in turns makes the enterprise more secure. Whether you are a human user, a device, a leopard or a zebra, protecting your identity is critically important.  Read more...

 

Gartner: Privileged Access Management is the #1 Cyber Security Priority for 2018

A recent report from Gartner reveals the top IT Security Projects for 2018 with Privileged Access Management as #1, Application Control #4 and Protecting Endpoints #6.  Before we get into why Privileged Access Management (PAM) is the #1 Cyber Security Priority in 2018, let’s take a quick look at what lead up to this change.  Senior executives are more involved in cyber security than ever before.  In fact, cyber security is top of everyone’s mind in today’s hyper-connected world.  Yet in spite of this, breaking news announces one cyber-attack after the next—from ransomware to data breaches and DDoS (Distributed Denial of Service) attacks—usually attributed to cyber-criminals or nation states, and almost always beyond our own country’s borders and laws. Read more...

 

Develop an Identity and Access Management (IAM) strategy for the mobile enterprise

In the past, identity management relied on simple username and password authentication methods and involved only a few types of devices. However, as mobile devices become more prevalent in the workforce, IAM must evolve, as well.  BYOD programs, spurred by the popularity of mobile devices, complicate identity and access management (IAM) because they not only add a slew of different devices, but they also bring about security-related concerns as users begin to work remotely. To account for these additional factors, an IAM strategy should include features such as single sign-on (SSO), multifactor authentication (MFA) and biometric authentication. Read more...

 

5 Key Areas Where You Need Multi-Factor Authentication Now

From cloud applications to digital workspaces—and everywhere in between—your organization has more points of access vulnerability than ever. Learn how multi-factor authentication can make access more secure in five key areas, without making it more difficult for legitimate users.  Once upon a time, there was just one point of access to your organization’s data, applications and other resources. It was a lot easier to secure access then. But there were also fewer opportunities to thrive and grow than there are in today's complex, dynamic access environment. To take advantage of those opportunities, you need multi-factor authentication to increase protection of critical resources at five key points of access. Read more...

 

Author Information