The Disjointed State of CIAM
As conscious consumers, we are all familiar with the different stages of the digital consumer lifecycle from registration and onboarding to authentication, transaction, and sometimes also the deletion of an account. As users we expect a frictionless experience while our data is kept safe.
2023 Trends and Predictions - Passwordless Authentication
We hear it all the time: “Humans are the weakest link in cybersecurity”. Unfortunately, this contemptuous characterization of human nature is deeply ingrained in the industry. While human error is still the driving force behind a number of security breaches and incidents, the modern cybersecurity la
A New Pamocracy is Growing Inside Your Organization
OK everybody is doing it right now, so I asked the analyst’s new best friend, Chat GPT, to define Privileged Access Management. Here is what it said: “Privileged Access Management (PAM) is a critical security discipline that provides a framework to manage and monitor privileged access to sensitive s
Identity Fabrics: Where Do You Stand? Where Should You Go?
The term and concept of Identity Fabrics has become popular in recent years. We observe widespread adoption of the concept as the foundation for further evolving IAM (Identity & Access Management) infrastructures. To provide a guideline for organizations, KuppingerCole Analysts have developed a matu
The Path of Unifying Identities
One Identity Field Strategist Robert Byrne explains why he thinks that the identity community needs to better educate business and even IT managers who shortsightedly equate identity with their login account.
UK Data Protection – What Is Changing
On March 8th, 2023, the UK Government introduced a new Data Protection and Digital Information Bill (2) into parliament. The government announcement of this bill claimed that “British Businesses to Save Billions Under New UK Version of GDPR”. What does this mean in practical terms for businesses
Avoiding Pitfalls in CIAM
Sadrick Widmann, CEO at cidaas, thinks that the biggest risk to an organization’s network is the user. Therefore, users need to be supported by frictionless technology so they don't engage in risky behavior.
Are Cyber Insurance Policies Necessary?
Cyber insurance offers protection against financial damage resulting from catastrophes involving computer networks, such as data breaches, network failures, and cyber-attacks. Cyber insurance policies are typically used to cover a wide variety of costs associated with cyber incidents, including reme
CIAM: Balancing security and user experience to get value from customer data
Business is increasing going online in the digital and post-pandemic era, and as a result, the collection, protection, and management of consumer and customer information has become extremely important.
Going Passwordless – Separating Identity and Authentication
Before starting any passwordless authentication journey, understanding the difference between identity and authentication is an important step. Alejandro Leal takes you on an exploration of the meaning of identity and authentication in the digital world, and how it applies to passwordless authentica
Gear Up for the Future with Decentralized Identity
In the digital era, business would greatly benefit from having increased identity assurance levels, be able to interact securely with partners, suppliers, consumers, and customers, and be able to reduce the administrative load during onboarding or ongoing verification of credentials.
Passwordless Authentication 101
Organizations are faced with ever-increasing security risks, and traditional passwords have been shown over and over again to be unable to shelter users from those risks. Learn how to secure your information by going passwordless.
Previous
3 4 5 6 7 8 9 Next