In Part 1 of a three part-video series, Andrew Abel, a cybersecurity and zero trust consultant and CyberEdBoard member, and Chase Cunningham, CSO at Ericom Software, share tips on how to create an identity strategy within the broader context of zero trust.
Thoma Bravo has deepened its presence in the identity space, agreeing to buy ForgeRock for $2.3 billion just months after inking deals with Ping Identity and SailPoint. The deals mean that Thoma Bravo has spent $12 billion building a platform with expertise around CIAM and identity governance.
European lawmakers advanced legislation for a continentwide framework for digital identity after agreeing to provisions assuring online anonymity and local storage of digital documents. The European Commission first proposed in 2021 a framework for a digital identity accepted in all member states.
The latest edition of the ISMG Security Report discusses how adversaries have a new favorite tactic to circumvent MFA, why vendor Akamai is an appealing target for private equity, and what the industry can do differently to attract more females to leadership roles.
84% of organizations experienced an identity related breach last year.(1) It’s clear that as companies digitally and organizationally transform, securely connecting the right people to the right access has moved beyond human capacity. In today’s accelerating, modern digital age companies need to automate identity...
Passwords are supported everywhere. But, says Andrew Shikiar, executive director of the FIDO Alliance, "they have been proven time and time again to simply be unfit for today's networked economy." In this episode of "Cybersecurity Unplugged," Shikiar discusses how to move beyond passwords.
In PWC’s 25th Annual Global CEO Survey, respondents listed cyber risks as their top threat to growth.
Download this eBook to learn about
How to understand what is and isn't covered within a cybersecurity policy;
The techniques you need to have in place to help meet cyber insurance requirements....
The world of work has changed. For businesses. For leaders. For employees. Remote jobs now make up more than 15% of the total opportunities in the U.S. and as we look to the future, one fact becomes clear: remote work is here to stay.
Companies have shifted their strategies to allow for long-term remote or hybrid...
In the latest weekly update, ISMG editors discuss the industrywide implications of a teenager hacking into Uber's internal systems, key trends in the new Gartner SD-WAN Magic Quadrant report, and how ethics and security culture are center stage due to recent CISO revelations at Uber and Twitter.
Decentralized identifiers and verifiable credentials, in which consumers can use their digital identity credentials for a variety of tasks, have significant evolving potential within the realm of identity and access management, says Merritt Maxim, vice president and research director at Forrester.
Japanese conglomerate Hitachi has sold its small identity-as-a-service practice to Canadian software specialist Volaris Group to drive better execution around core products. The firm found it was easy to get lost within Hitachi given the conglomerate's size and focus on electronics and engineering.
For regulated businesses, there is a requirement called Know Your Customer (KYC) and it is a subset of Anti-Money Laundering (AML). Read this guide to learn how you can develop a Trust Framework that answers the four most important questions to establish a trusted relationship with your customers:
Is this a real...
In a 2020 survey, 70% of fraud executives agreed that synthetic identities were a bigger challenge than traditional identity theft. More recently, 23% of businesses see synthetic identity fraud as the most prevalent fraud scheme in their industry.
Download this eBook to learn:
What is fueling the growth of Synthetic...
NortonLifeLock and Avast completed their $8.6 billion merger Monday, forming a $3.5 billion consumer cyber protection behemoth with expertise across security, privacy and identity. The fully merged company will have fewer than 4,000 employees and will initially go to market as NortonLifeLock.
With Microsoft offering a cost-effective and highly integrated security stack that covers endpoint, email, cloud, identity and more, many organizations are replacing their legacy tools with Microsoft’s advanced security stack and getting the most out of their Office 365 investment.
To fully unlock the power of...