Managing Privileged Access in Complex IT Environments for Business Benefit
Ensuring that only authorized individuals can access IT systems and data is at the core of cybersecurity, especially as most successful cyber-attacks are enabled by the abuse of stolen credentials. Access management, therefore, is an essential part of any cybersecurity strategy, but in the modern business world, where cloud computing, virtual machines, DevOps, automation, AI, and remote working are common, this can be extremely challenging. Adding to the complexity of access management, these business IT technologies and practices increasingly involve the use of service accounts for...
The Disjointed State of CIAM
As conscious consumers, we are all familiar with the different stages of the digital consumer lifecycle from registration and onboarding to authentication, transaction, and sometimes also the deletion of an account. As users we expect a frictionless experience while our data is kept safe. In today’s Speaker Spotlight James Lapalme, Vice President Identity at Entrust, explains why organizations issuing digital identities need to gain a full view of the currently somewhat disjointed landscape of customer identities to be able to offer security and a frictionless user experience at...
2023 Trends and Predictions - Passwordless Authentication
We hear it all the time: “Humans are the weakest link in cybersecurity”. Unfortunately, this contemptuous characterization of human nature is deeply ingrained in the industry. While human error is still the driving force behind a number of security breaches and incidents, the modern cybersecurity landscape has become too broad and sophisticated to be managed by individuals alone. By modernizing and implementing the right tools, however, we may be able to reduce and improve the impact of the human factor on cybersecurity. The Alternative? Passwordless Authentication...
A New Pamocracy is Growing Inside Your Organization
A New Pamocracy is Growing Inside Your Organization When you were not looking, the number of privileged identities you manage went from thousands to millions OK everybody is doing it right now, so I asked the analyst’s new best friend, Chat GPT , to define Privileged Access Management . Here is what it said: “Privileged Access Management (PAM) is a critical security discipline that provides a framework to manage and monitor privileged access to sensitive systems and data. PAM solutions aim to prevent unauthorized access, reduce the risk of cyberattacks, and ensure...
Identity Fabrics: Where Do You Stand? Where Should You Go?
A maturity level matrix for Identity Fabrics The term and concept of Identity Fabrics has become popular in recent years. We observe widespread adoption of the concept as the foundation for further evolving IAM (Identity & Access Management) infrastructures. To provide a guideline for organizations, KuppingerCole Analysts have developed a maturity model for Identity Fabrics, as we have done for other areas of IAM and cybersecurity . What makes up maturity of an Identity Fabric When working on such maturity models, the first question to ask is what makes up maturity in that...
The Path of Unifying Identities
Most people in the identity and access management community would agree that digital identities are necessary for successful digitization. Tune in to today's Speaker Spotlight with One Identity's Field Strategist Robert Byrne to learn why it is necessary to unify identities in order to sensibly manage the access that is enabled by these digital identities, whether that is related to the lifecycle, privilege, authentication access management, or even directory security aspects of identity. Don't miss Robert's keynote at this year's European Identity and Cloud Conference 2023 entitled...
UK Data Protection – What Is Changing
On March 8 th , 2023, the UK Government introduced a new Data Protection and Digital Information Bill (2) into parliament.  The government announcement of this bill claimed that “British Businesses to Save Billions Under New UK Version of GDPR”.   What does this mean in practical terms for businesses and consumers? Nothing has changed - yet This announcement needs to be put into context.  Firstly, the political context is that the government has been under pressure to show some tangible benefits from Brexit.  In September 2022, the UK...
Avoiding Pitfalls in CIAM
A frictionless customer experience can support an organization's security posture because it prevents users from engaging in risky behavior. Tune in to cidaas CEO Sadrick Widmann's Speaker Spotlight to learn why customer experience is not only useful for security but also for business.
Are Cyber Insurance Policies Necessary?
Cyber insurance offers protection against financial damage resulting from catastrophes involving computer networks, such as data breaches, network failures, and cyber-attacks. Cyber insurance is used to cover a wide variety of costs associated with cyber incidents, including remediation costs, legal expenses, and losses as a result of reputational damage.    Cyber insurance coverage is often tailored to meet the requirements of the company insured. Insurance firms are carrying out increasingly thorough evaluations of the cybersecurity at organizations...
CIAM: Balancing security and user experience to get value from customer data
Business is increasing going online in the digital and post-pandemic era, and as a result, the collection, protection, and management of consumer and customer information has become extremely important. But keeping sensitive data like personally identifiable information private, safe, and secure, while at the same time ensuring it is accessible to the business and providing a frictionless user experience, can be challenging. Essential to meeting these important business challenges, is an understanding of the Customer Identity & Access Management (CIAM) technologies and processes...
Going Passwordless – Separating Identity and Authentication
Identity and Authentication Digital transformation can be defined as a process that organizations go through to deliver digital services to their customers and consumers in the Digital Age. Essentially, delivering digital services requires the management of the digital identities of consumers, customers, and business partners in a secure and seamless manner. Therefore, the success of digital transformation initiatives depends on managing access and managing these digital identities. In contrast to the increased centralization of digital identity, the authentication layer has become...
Gear Up for the Future with Decentralized Identity
In the digital era, business would greatly benefit from having increased identity assurance levels, be able to interact securely with partners, suppliers, consumers, and customers, and be able to reduce the administrative load during onboarding or ongoing verification of credentials. One potential solution, that is gaining momentum and support around the world, is the implementation of decentralized Identity systems that use verifiable credentials that are tamper proof, can be stored in a digital wallet, and can contain a decentralized identifier that is globally unique and can be...
Previous
1 2 3 4 5 6 7 Next