Identity Management & Cybersecurity News | 7.05.2018

Posted: 
Jul. 5th, 2018

3 Musts for VPN Multi-Factor Authentication  Data Security

A multi-factor authentication solution with a powerful risk analytics component will be able to discern the level of risk posed by a request to access the VPN and respond accordingly. That means you can require more authentication only when access risk is high enough to warrant it, rather than every time there is a request. This makes it possible to reduce risk while minimizing the inconvenience to legitimate users.  Read more...

 

The great identity re-architecture: enabling trust and interoperable credentials

What happens to all of the consumer and employees accounts online that are created but seldom used? Today digital identity information is replicating faster than the plastic waste in our landfills and oceans, and the harmful side effect is a global data breach epidemic that threatens the digital economy. But if we can reuse identity by designing our systems and applications to use interoperable credentials, we can not only protect individual privacy and inspire trust we can make the digital world a safer place.  Read more...

 

Making the case for investing in identity and access management

Kimberly Carrosino, senior director of identity and access management at Providence Health and Services, says hiring a partner to manage identities within healthcare systems can reduce costs, improve compliance and automate certain workflows. Read more...

 

Security versus usability a conundrum in modern identity management?

Verification is an important aspect in determining the validity of a digital identity. However, it is also a usability hurdle. Getting the balance between a high level of verification and meeting on-boarding targets is a golden chalice in the identity space. To meet this goal, you need to make the registration process for an online identity as easy as possible. This is one of the hardest areas of designing IAM, especially identity for wide demographics. Read more...

 

Healthcare Organizations Must Strengthen Their Cybersecurity Immunity To Avoid Falling Victim To Cybercriminals

Implementing an identity access management (IAM) solution enables organizations to monitor employee access to PII and immediately restrict access to information when authorized users are detected. Regularly auditing healthcare networks for vulnerabilities also allows healthcare organizations to test their cyber resiliency and make adjustments when necessary. Read more...

 

Author Information