What's needed to make a shift from traditional IAM to CIAM? To start, an organization needs to look at fraud detection solutions and risk-based authentication technologies such as device intelligence and behavioral biometrics, says David Britton of Experian.
Identity management will be at the forefront of securing remote work in the coming year. Jason Bohrer, new leader of the Secure Technology Alliance and the U.S. Payments Forum, describes key initiatives as he steps into this role.
The security challenges presented by the COVID-19 pandemic, including managing a remote workforce, point to the need to prioritize identity management, say Rebecca Archambault of Blue Cross Blue Shield and Jeremy Grant of the law firm Venable.
The Identity Governance and Administration (IGA) market is continuing to evolve through more integrated Identity Provisioning and Access Governance solutions that are now increasingly aided by intelligent features. This Leadership Compass will give an overview and insights into the IGA market, providing you a...
Why identity is your #1 security problem
Watch the Computer Weekly interview
Bryan Glick, editor-in-chief at Computer Weekly, speaks to Okta's Max Faun about identity and security, covering:
Why 81% of cybersecurity breaches are password-related
How Customer Identity and Access Management (CIAM) can help you...
In the current era of instant consumer gratification, business-to-consumer (B2C) brands are jostling to deliver top-notch customer experiences that span online, offline, social media, the Internet of Things (IoT), and even virtual reality (VR) interactions.
In order to not just survive, but thrive in this...
Every company must become a technology company. Your customer’s requirements are changing with the explosion of channels, devices, platforms and touchpoints. And secure experiences with those interactions is paramount.
CIAM is foundational technology that meets increasingly complex customer requirements and...
Every business and industry are unique. Take finance, for example, who are in the business of managing money. How do the finance industry’s IAM priorities differ from an IT organization, who is in the business of selling technology?
Download the eBook to learn:
The main IAM challenges and priorities for...
A confluence of events is bringing the need for a new cybersecurity perimeter into clearer focus. The rapid adoption of "cloud first" strategies -across multiple cloud computing flavors (SaaS, PaaS, IaaS and more) - combined with the reality that "work from home" simply hastened employees need for access to apps and...
Fraudsters are sending phishing emails with messages about the Coinbase cryptocurrency exchange to Microsoft Office 365 users in an attempt to take over their inboxes and gain access to data, according to the security firm KnowBe4.
The latest edition of the ISMG Security Report analyzes why clothing retailer H&M was hit with a hefty fine for violating the EU's General Data Protection Rule. Also featured: The coming of age of digital identities; deputy CSO at Mastercard on top priorities for 2021.
The U.S. Cybersecurity and Infrastructure Security Agency is warning about a recent spike in Emotet botnet attacks - designed to spread other malware - that are targeting state and local government agencies.