Blog
The Disjointed State of CIAM
by Marius Goeddert
As conscious consumers, we are all familiar with the different stages of the digital consumer lifecycle from registration and onboarding to authentication, transaction, and sometimes also the deletion of an account. As users we expect a frictionless experience while our data is kept safe. In today’s Speaker Spotlight James Lapalme, Vice President Identity at Entrust, explains why organizations issuing digital identities need to gain a full view of the currently somewhat disjointed landscape of customer identities to be able to offer security and a frictionless user experience at...
Blog
2023 Trends and Predictions - Passwordless Authentication
by Alejandro Leal
We hear it all the time: “Humans are the weakest link in cybersecurity”. Unfortunately, this contemptuous characterization of human nature is deeply ingrained in the industry. While human error is still the driving force behind a number of security breaches and incidents, the modern cybersecurity landscape has become too broad and sophisticated to be managed by individuals alone. By modernizing and implementing the right tools, however, we may be able to reduce and improve the impact of the human factor on cybersecurity. The Alternative? Passwordless Authentication...
Blog
A New Pamocracy is Growing Inside Your Organization
by Paul Fisher
A New Pamocracy is Growing Inside Your Organization When you were not looking, the number of privileged identities you manage went from thousands to millions OK everybody is doing it right now, so I asked the analyst’s new best friend, Chat GPT , to define Privileged Access Management . Here is what it said: “Privileged Access Management (PAM) is a critical security discipline that provides a framework to manage and monitor privileged access to sensitive systems and data. PAM solutions aim to prevent unauthorized access, reduce the risk of cyberattacks, and ensure...
Blog
Identity Fabrics: Where Do You Stand? Where Should You Go?
by Martin Kuppinger
A maturity level matrix for Identity Fabrics The term and concept of Identity Fabrics has become popular in recent years. We observe widespread adoption of the concept as the foundation for further evolving IAM (Identity & Access Management) infrastructures. To provide a guideline for organizations, KuppingerCole Analysts have developed a maturity model for Identity Fabrics, as we have done for other areas of IAM and cybersecurity . What makes up maturity of an Identity Fabric When working on such maturity models, the first question to ask is what makes up maturity in that...
Blog
The Path of Unifying Identities
by Marius Goeddert
Most people in the identity and access management community would agree that digital identities are necessary for successful digitization. Tune in to today's Speaker Spotlight with One Identity's Field Strategist Robert Byrne to learn why it is necessary to unify identities in order to sensibly manage the access that is enabled by these digital identities, whether that is related to the lifecycle, privilege, authentication access management, or even directory security aspects of identity. Don't miss Robert's keynote at this year's European Identity and Cloud Conference 2023 entitled...
Blog
UK Data Protection – What Is Changing
by Mike Small
On March 8 th , 2023, the UK Government introduced a new Data Protection and Digital Information Bill (2) into parliament.  The government announcement of this bill claimed that “British Businesses to Save Billions Under New UK Version of GDPR”.   What does this mean in practical terms for businesses and consumers? Nothing has changed - yet This announcement needs to be put into context.  Firstly, the political context is that the government has been under pressure to show some tangible benefits from Brexit.  In September 2022, the UK...
Blog
Avoiding Pitfalls in CIAM
by Marius Goeddert
A frictionless customer experience can support an organization's security posture because it prevents users from engaging in risky behavior. Tune in to cidaas CEO Sadrick Widmann's Speaker Spotlight to learn why customer experience is not only useful for security but also for business.
Blog
Are Cyber Insurance Policies Necessary?
by Marina Iantorno
Cyber insurance offers protection against financial damage resulting from catastrophes involving computer networks, such as data breaches, network failures, and cyber-attacks. Cyber insurance is used to cover a wide variety of costs associated with cyber incidents, including remediation costs, legal expenses, and losses as a result of reputational damage.    Cyber insurance coverage is often tailored to meet the requirements of the company insured. Insurance firms are carrying out increasingly thorough evaluations of the cybersecurity at organizations...
Blog
CIAM: Balancing security and user experience to get value from customer data
by Warwick Ashford
Business is increasing going online in the digital and post-pandemic era, and as a result, the collection, protection, and management of consumer and customer information has become extremely important. But keeping sensitive data like personally identifiable information private, safe, and secure, while at the same time ensuring it is accessible to the business and providing a frictionless user experience, can be challenging. Essential to meeting these important business challenges, is an understanding of the Customer Identity & Access Management (CIAM) technologies and processes...
Blog
Going Passwordless – Separating Identity and Authentication
by Alejandro Leal
Identity and Authentication Digital transformation can be defined as a process that organizations go through to deliver digital services to their customers and consumers in the Digital Age. Essentially, delivering digital services requires the management of the digital identities of consumers, customers, and business partners in a secure and seamless manner. Therefore, the success of digital transformation initiatives depends on managing access and managing these digital identities. In contrast to the increased centralization of digital identity, the authentication layer has become...
1 2 3 4 5 6 7 Next