Identity Management & Cybersecurity News | 6.28.2018

Posted: 
Jun. 28th, 2018

Who Reports Data Breaches? cybersecurity

Data breaches are becoming (almost) commonplace. It seems that major new public and private sector data breaches are announced every week — if not most days.  Most states have laws mandating the public disclosure of data breaches where personally identifiable information (PII) is at risk. You can see the details of those laws at this National Council of State Legislators (NCSL) website.  Read more...

 

Connecting ABAC to identity governance and administration to extend access control capabilities

As a first line of defense to effectively and efficiently control access to applications and data, organizations are turning toward identity governance and administration (IGA) to support both enterprise security and regulatory compliance. By leveraging IGA tools, access control is managed at administration time by automating the user provisioning and de-provisioning process.  Read more...

 

The perfect password – two-factor authentication

Two-factor authentication can not only help increase security, but as a result it can increase customer loyalty and trust, as they feel the company cares about their personal data.  A single-factor authentication (a password) is easy for users but makes the system vulnerable to a wide variety of cyberattacks. This is where two-factor authentication (2FA) comes in by adding an additional layer of security, which is simple for customers to use, to their accounts. 2FA is a simple fix to an age-old problem.  So, what does this actually mean for consumers and companies? Essentially, 2FA also reduces the risk of hack attacks. Unfortunately, consumers make it very easy for hackers to get their hands on their login details, and according to a new survey.  Read more...

 

The Need For A Universal Approach To Identity Management

Traditionally, identity management has been about security, but it has evolved into so much more. A universal identity solution can improve the day-to-day operations of a business -- increase efficiency with enterprise federation, improve personalization campaigns with progressive profiling and shorten the sales cycle -- just to name a few examples. Read more...

 

5 Breakthrough Technologies to Combat Insider Threats in 2018

The privileged user is the individual that has direct oversight to manipulate and influence a company’s data. Privileged Access Management (PAM) is the software that helps you prevent misuse of privileged access by these users. With admin controls, an insider threat can divulge and manipulate data at will. PAM monitors and authorizes privilege users in all important systems across the company. This software is one of most foundational to insider threat mitigation.  Read more...

 

Author Information