As businesses worldwide transition to digital first models, traditional identity verification methods are being targeted by increasingly sophisticated fraud attempts.
Why? Because tricking the system has never been so lucrative.
Biometric verification enables customers to prove ownership of their identity documents,...
The sentencing of a former worker at a substance abuse treatment provider in connection with a Medicaid fraud conspiracy "is an important reminder about the threats from insiders," one privacy attorney says.
The traditional IAM strategy has been to tie individual users with a unique device. But that doesn't work in healthcare settings, where doctors and nurses often share multiple devices. Jigar Kadakia of Partners HealthCare talks about how he approaches this critical challenge.
Security professionals are hard-wired to focus on the technical aspects of cyber attacks during a breach response, but non-technical aspects are often deceptive and go overlooked. Identity can be a powerful tool to bolster your defenses - and the untapped market potential is huge.
Download this eBook to learn from...
By partnering with Ping Identity, Gates was able to bring the vision of a global authentication authority to life with advisory, configuration, deployment, and employee training.
Often in breach response, security professionals focus on the technical aspects of the attack. Yet, the non-technical aspects are often more insidious, says Teju Shyamsundar of Okta. And Identity can be a powerful tool to bolster defenses.
What approaches are healthcare entities taking with their credentialing and IAM to better verify and manage the identities of patients, clinicians, researchers, vendors and others who want or need access to health and other critical data? Our panelists Cris Ewell, CISO at UW Medicine and Jigar Kadakia, CISO and chief...
In the digitally-transformed healthcare landscape, PHI is transmitted and stored in the cloud and accessed by legions of privileged users; patients now have unprecedented access to their own data and records, which are coveted by fraudsters on the Dark Web; and regulators are increasingly scrutinizing the privacy and...
Gates Corporation CISO Sam Masiello on how they brought their vision of a global authentication authority to life with advisory, configuration, deployment, and employee training.
Provisioning and deprovisioning employee credentials is a critical component of mitigating insider threats, says Andrew Clarke of One Identity, who discusses the importance of identity and access management.
Multiple account repositories and the management of identities and entitlements across applications are commonplace in many organizations. Whether it is mitigating the threats legacy systems present in the securing of these accounts and identities or assigning credentials and entitlements appropriately, businesses...
Blair Bonzelaar of Okta discusses the requirements for making the transition to a zero trust model for securing enterprises and offers practical identity management insights.
As part of healthcare's digital transformation, payers and providers alike have rolled out patient portals and telemedicine platforms to increase access to care, improve patient participation and decrease healthcare administrative costs.
How secure are these portals? What types of authentication protocols are used to...
As part of healthcare's digital transformation, payers and providers alike have rolled out patient portals and telemedicine platforms to increase access to care, improve patient participation and decrease healthcare administrative costs.
How secure are these portals? What types of authentication protocols are used to...
The latest edition of the ISMG Security Report describes Apple's newly announced single sign-on function that's built with privacy in mind. Plus, a discussion of the "other" insider threat and an Infosecurity Europe conference recap.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.