Identity Management & Cybersecurity News | 8.30.2018

Posted: 
Aug. 30th, 2018

Data securityProtecting Your Company When Your Privileged Credentials Are For Sale

81% of all hacking-related breaches leverage either stolen and weak passwords, according to Verizon’s 2017 Data Breach Investigations Report. A recent study by Centrify and Dow Jones Customer Intelligence titled, CEO Disconnect is Weakening Cybersecurity (31 pp, PDF, opt-in), found that CEOs can reduce the risk of a security breach by rethinking their Identity and Access Management (IAM) strategies. 68% of executives whose companies experienced significant breaches in hindsight believe that the breach could have been prevented by implementing more mature identity and access management strategies.  Read more...

 

The Cybersecurity Regulations Healthcare, Financial Services, and Retail Industries Must Know About

As a response to the growth of sophisticated threats, regulatory bodies have issued guidelines and standards to ensure necessary cybersecurity processes and controls are in place across the healthcare, financial services, and retail industries to minimize the impact of an attack. To ensure compliance with these various regulations, organizations must build out the technical infrastructure required to secure data, as well as the processes to report on compliance status.  Read more...

 

Password Management Remains an Issue — What’s Next?

Companies are offering password-free authentication options, such as the Universal Second Factor (U2F) security key or smartphone applications that use dynamic authentication options. While IT and security professionals embrace these password-free options, it remains to be seen when — and whether — the average user will make the switch.  Read more...

 

IDaas: The Promise and Value of Emerging Strategy

The promise of IDaaS involves getting all identity management capabilities out of the box, without having to have super technical skilled resources, and never having to wait for the next release to take advantage of new features.  Read more...

 

Suffer a data breach; lose up to one third of your customers

Identity assurance… With identity management at the core of all security programs (and representing the biggest threat vector), it’s critical to design iron-clad identity management policies and technologies.  Advanced cyber-defense practice… Identifying gaps, prioritizing risks and designing programs to improve defenses, integrate solutions, provide deep visibility, detect advanced threats and reduce mitigation time.  Incident response practice… By combining early detection and rapid response, organizations can close the gap between an initial breach and an attacker being able to carry out their objectives.  Read more...

Author Information