Within weeks of the California Consumer Privacy Act of 2018 going into effect, the first CCPA lawsuit was filed in U.S. District Court in Northern California, based on a personal data breach of a retailer and its cloud service provider. Since then, many lawsuits have been filed, addressing multiple aspects of...
Every team building a mobile or app has a choice to make: build the whole app from scratch or find and use a pre-built option to A third-party customer identity and access management (CIAM) solution is another such service. A digital identity layer comprised of APIs, SDKs, and out-of-the-box customizable components...
"Passwordless authentication" is one of the hot cybersecurity topics, but who's actually implemented it - and how? Jeff Carpenter of HID Global discusses the business benefits and the future of passwordless authentication.
Carpenter, the director of identity and access management solutions at HID Global, starts with...
The COVID-19 pandemic caught many global enterprises by surprise. But as they prepare to emerge from quarantine and reopen their doors, they are taking a thoughtful approach to bolstering cybersecurity for on-premise and remote workers alike. Pamela Kubiatowski of Zscaler shares insights.
What does workforce authentication look like today? And as this remote workforce becomes the norm, how do you envision workforce authentication in five years? These are the questions posed by Jeff Carpenter of HID Global in an upcoming roundtable discussion.
In honor of World Password Day, here's a task for every organization that uses remote desktop protocol: Ensure that all of your organization's internet-facing RDP ports have a password - and that it's complex and unique.
Over the course of three days, ISMG and SecureAuth teamed up for a series of virtual roundtable discussions on the future of identity security. Bil Harmer of SecureAuth reflects on these discussions and how they inform his view of the factors influencing both the present and future of identity.
Employees and customers don't care where the application or resource they need access to is located, or what different mechanisms are required to ensure security and privacy. They just want access to be intuitive and trustworthy. Developers need simple hooks into the solutions they are building to allow them to...
The latest edition of the ISMG Security Report analyzes the privacy issues raised by COVID-19 contact-tracing apps. Also featured: An update on efforts to fight fraud tied to economic stimulus payments; John Kindervag on the origins of "zero trust."
The cost of not complying with the California Consumer Privacy Act (CCPA) is high. This leaves companies open to the possibility of substantial financial penalties through its users. IT professionals must understand why it's important for vendors to comply with CCPA, and why those that do not can be an unacceptable...
Enterprises long have practiced workforce identity and access management, but increasingly they are rolling out customer IAM, or CIAM. What's driving the trend, and where should cybersecurity leaders look to assert influence? Keith Casey of Okta explores some CIAM myths and realities.
With a global remote workforce, the concept of secure identity has never been more critical. What is the present and future of identity? In a preview of an upcoming virtual roundtable discussion, SecureAuth's Bil Harmer shares his vision.
Identity and access management for the workforce? Cybersecurity leaders are all over that. But what about customer IAM? There's plenty of room to grow there, judging by Dallas roundtable discussion featuring Richard Bird of Ping Identity and Gray Mitchell of IDMWORKS.
"The CCPA is just the U.S. version of the GDPR."
"If I'm compliant with the GDPR, I'm also compliant with the CCPA."
"Personal data under GDPR is the same as personal information under CCPA."
All of this common wisdom about the GDPR and CCPA is arguably false. In fact, there are numerous differences, some...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.