The year 2020 will be remembered as the landmark date when enterprises strove for business resilience and achieved digital transformation. Heading toward 2021, how can enterprises continue to evolve and provide value? Pamela Kubiatowski of Zscaler offers guidance.
The latest edition of the ISMG Security Report discusses global progress on adopting standard digital identifiers. Plus, a former cybercriminal discusses emerging fraud trends, and an update on the evolution of e-signatures.
This edition of the ISMG Security Report analyzes whether IoT devices will outlive their security updates. Also featured: Why security spending needs to shift further upstream; could banks be custodians of identity?
Enterprises need to move away from manual threat detection methods to leverage artificial intelligence, which can help boost defenses, says Dr. Jassim Haji, president of Artificial Intelligence Society, Bahrain Chapter.
Emerging passwordless security standards, elevated consumer and consumer-like experience expectations, and ballooning costs have moved eliminating passwords from a theoretical concept to a real possibility. In this whitepaper, we will explore the case for going passwordless for both customer and employee...
Organisations want their dev teams to roll out great new experiences that attract and retain customers while improving their lifetime value. However, today's end users are trained by the Googles, Amazons, and Facebooks of the world to disengage from experiences that aren't technologically advanced, frictionless,...
Account Takeover (ATO) - An increasingly common consumer attack method wherein a bad actor gains illegal access to a user's account, and can exploit that access for financial or informational gain. Every digital business featuring a login page is at risk of this method.
To date, most organisations have had hard boundaries between system administrators and their software development teams, where they occasionally interact, rarely coordinate, and never collaborate. As the needs for collaboration between IT administrators and software developers - both internal and external - continue...
Jeremy Grant, who led the public/private National Strategy for Trusted Identities in Cyberspace during the Obama administration, has spent more than two decades championing the cause of secure identity systems. Enter the COVID-19 pandemic, which created a remote workforce of unprecedented scale seemingly overnight....
For an upcoming virtual roundtable, Alex Laurie of ForgeRock discusses the importance of digital identity management, the need for organizations to quickly and accurately register people, comply with privacy regulations and define and manage the level of risk involved.
A robust customer identity and access management strategy is critical to digital success for today's financial institutions. Eugenio Pace of Auth0 and Paul Bedi of IDMWORKS discuss CIAM in the age of the remote worker.
Too many enterprises remain chained to outdated and vulnerable identity and access management technologies - legacy systems that rely on passwords, eat budgets and kill productivity. Baber Amin of Ping Identity and Cody Cook of ProofID preview a new virtual roundtable on Modern IAM.
The latest edition of the ISMG Security Report sizes up progress made so far on identity management and the work yet to be done. Also featured: how security concerns are holding back IoT projects and the privacy issues raised by recording videoconferences.
Purpose-built backup appliances (PBBAs) have been foundational components to many organizations' backup/recovery infrastructure for more than a decade. The importance of PBBAs is illustrated in the numbers: According to IDC, in 2019, the data replication and protection (DR&P) market was approximately $9.2 billion,...
With 82 per cent of CISOs feeling burnt out, what's going on in the cyber industry to cause this? And what can be done to stop CISO burnout? The Cybersecurity special report, published in The Times, explores the cybersecurity industry from C-suite roles to cyber threats while working from home. It looks at the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.