Whitepaper Vorsprung vor den Cyberkriminellen: Die externen Bedrohungen verstehen June 30, 2022 Verantwortliche für Cybersicherheit sehen sich mit wachsenden Herausforderungen konfrontiert, da die Cyberkriminellen immer kreativer werden und mit einem anscheinend unendlichen Arsenal an...
Whitepaper Einfachere und stärkere Authentifizierung mit passwortloser Desktop-MFA June 30, 2022 Wenn ein Passwort wie ein Hausschlüssel ist, dann sollte die Grundlage der Sicherheit der IT-Systeme eines Unternehmens eine sicher verschlossene Eingangstür sein. Wenn die Eingangstür bestmöglich...
Whitepaper IAM Projects Done Right: Everything as a Service June 30, 2022 Delivering on IAM is not always easy. Many organizations have experienced IAM projects stalling. An approach for one-stop-shopping can help, where the implementation, the IDaaS style deployment...
Leadership Brief Cyber Hygiene: The Foundation for Cyber Resilience June 28, 2022 Most cyber incidents result from poor cyber hygiene. To avoid these, organizations must make sure that all the routine tasks needed to keep their systems, data, and applications safe are performed...
Whitepaper Why Your Organization Needs Data-centric Security June 28, 2022 Data-centric security is an alternative approach towards information protection that has emerged as a direct response to the increasingly obvious failure of traditional measures focusing on...
Whitepaper Customer authentication with zero-friction passwordless authentication June 23, 2022 To increase security and convenience, businesses and organizations need to adopt and implement a modern authentication system that does not rely on customers remembering usernames and passwords....
Market Compass Cybersecurity for Industrial Control Systems June 23, 2022 Focus on Operation Technology (OT) is increasing for two reasons: firstly, governments worldwide have, or are threatening to, intervene in cases of compromise of OT infrastructure and secondly,...
Executive View Beyond Identity Secure Customers June 22, 2022 Password authentication is not only insecure, but it leads to poor consumer experiences and is costly for organizations to maintain. As far as customer authentication is concerned, there are three...
Executive View BehavioSec™, a LexisNexis® Risk Solutions Company June 21, 2022 BehavioSec™, a LexisNexis® Risk Solutions Company, ist ein Anbieter von Lösungen für die Erkennung von Angriffs- und Betrugsrisiken bei der Authentifizierung (Fraud Reduction). Die...
Whitepaper A Passwordless Future Begins with Credential Management June 14, 2022 Although it enables a Zero Trust security approach, the journey to passwordless is often challenging and may require an organization to use multiple authentication methods to meet their varied use...