In the wake of digital transformation and several large, high-profile data breaches - and at a time where all the personal information is shared in the social network - traditional forms of digital identity verification are no longer valid.
Customers have zero patience for extra steps, and yet they expect their...
Many companies that have adopted a layered security strategy still fail to protect their Domain Name System (DNS) infrastructure, a critical Internet protocol that was never designed with security in mind.
Read this white paper to learn why integrating a DNS-based solution with layered enterprise and zero trust...
Better, stronger fraud-detection intelligence - that's the promise of the new 3-D Secure 2.0 protocol for digital merchants, networks and financial institutions. But what should organizations do to prepare? James Jenkins of CA Technologies weighs in.
This edition of the ISMG Security Report includes an analysis by Executive Editor Matthew J. Schwartz on President Donald Trump's changing views on election meddling, plus an update on voter data being accidently exposed by a robocalling company.
At the advent of real-time payments, it's more critical than ever for organizations to quickly authenticate users and transactions. And David Vergara of OneSpan says emerging tools build upon legacy technologies to ensure trusted identity with minimal friction.
Businesses undertaking digital transformation - typically involving a push to the cloud, amongst other initiatives - must put security first if they want their project to achieve optimum success, says Fortinet's Patrick Grillo.
Humana is notifying individuals in multiple states that the company was a recent target of an "identity spoofing attack" that potentially compromised personal information of its members, including those participating in the health insurer's Go365 wellness programs.
Just one click: That's all it takes for a victim to inadvertently grant attackers access to their email account via a third-party application. Here's how to spot signs of OAuth-related hacking and how to defend against it.
Explosive growth in network scale and complexity demands a next generation Public Key Infrastructure (PKI) management platform. Ted Shorter of CSS says security leaders must prepare now to take full advantage of next-gen PKI solutions.
Consumers have more healthcare choices than ever, meaning payers and providers have more competition as well. Many are differentiating themselves in the marketplace by adding health tracking apps and integrating with partners to display prescription, billing and appointment .
Your patients and members are today's...
As if being a prime target for data breaches wasn't enough, complex and ever-changing regulations and standards in the financial services industry make securing, managing and controlling access to applications and data a strategic priority.
At the same time, exceptional user experiences are no longer just a...
The whole way we look at identity across the extended enterprise is in the midst of change. What is dynamic authentication, and how does it herald the future of digital identity?
Download this eBook on the future of digital identity and learn about:
The drivers toward dynamic authentication;
Explosive growth in network scale and complexity demands a next generation Public Key Infrastructure (PKI) management platform. Expansive enterprise digital certificate and PKI usage, coupled with the advent of massive Internet of Things (IoT) device introductions, requires automation for secure and scalable...
The whole way we look at identity across the extended enterprise is in the midst of change, says Naresh Persaud of CA Technologies. What is dynamic authentication, and how does it herald the future of digital identity?
Leading the latest edition of the ISMG Security Report: Years of massive data breaches have fueled an increase in synthetic identity fraud, in which fraudsters combine real and bogus details to create more effective fake identities. Plus, has "The Dark Overlord" hacking group finally met its match?