Identity & Access December 6, 2017 Teaming Up to Overhaul Authentication 2 min read - IBM is partnering with leading authentication providers to make it easier to integrate new authentication technologies with IBM Security Access Manager.
December 4, 2017 Enterprises Must Evolve Beyond Two-Factor Authentication to Secure Verification 2 min read - IT decision-makers need to evolve beyond two-factor authentication and design new ways to make the user verification process intelligent and risk-aware.
November 9, 2017 Public Key Infrastructure Concerns Raise Questions Over Internet Authentication System 2 min read - According to a recent paper, threat actors are abusing the code signing process associated with public key infrastructure and evading antivirus detection.
Endpoint November 3, 2017 Preparing for the iPhone X and the Future of Facial Recognition Technology 3 min read - The Face ID component is one of the most compelling new features of the iPhone X. Is facial recognition the future of authentication for the enterprise?
October 27, 2017 Future-Proof Your Access Management With Single Sign-On: A Lesson From Luxembourg 2 min read - Security professionals need an identity and access management solution that delivers single sign-on capabilities and can adapt to business change.
Endpoint October 12, 2017 Not Your Father’s Cybersecurity Tips: Think Outside the Box to Protect Your Identity During NCSAM 3 min read - These five cybersecurity tips can help users review and update their online practices to protect their identities from advanced threats.
Banking & Finance September 22, 2017 Building Digital Trust, One Blockchain at a Time 2 min read - Blockchain technology enables all participants in a transaction to validate whether the assets involved have been altered or tampered with.
Endpoint September 20, 2017 Have We Been Wrong All Along About Good Password Practices? 3 min read - In its new guidelines on secure password practices, NIST recommended using long strings of random words instead of a combination of characters and symbols.
Government September 11, 2017 e-Signature Security Speeds Government Paperwork Along 2 min read - The U.S. Census Bureau hopes to save $1.2 million annually by implementing e-signature technology in its internal personnel evaluation system.
Identity & Access September 7, 2017 Security Specialists Discuss Identity and Access Management in the Age of Ransomware 7 min read - Security teams should follow identity and access management (IAM) best practices to avoid widespread ransomware attacks such as WannaCry and NotPetya.