Customer identity and access management - CIAM - is coming of age, as enterprises seek a unified view of their customers. Keith Casey of Okta describes what CIAM maturity looks like - and how to get there via a new playbook.
In this eBook, Casey discusses:
How the CIAM conversation has changed in 2020;
Managing today's hybrid work environment is challenging, but securing that environment is equally important - and difficult. Ultimately, you need to connect your users to the right technology at the right time, in a secure way. To know that you're giving the right people access, you first need to have a way to know...
The FBI is warning organizations in the financial sector about an increase in botnet-launched credential stuffing attacks that are leading to the theft of millions. Many of these attacks, which target APIs, are being fed by billions of stolen credentials leaked over the last several years.
A hacking group targeting Iranian dissidents has developed malware that can bypass two-factor authentication protection on Android devices to steal passwords, according to Check Point Research. The hackers have also targeted victims' Telegram accounts.
An organization has successfully implemented a "zero trust" framework when it can achieve context-aware resolution of a risk, says Dr. Siva Sivasubramanian, CISO of SingTel Optus, an Australian telecommunications firm.
Zero Trust security throws away the idea that we should have a "trusted" internal network and an "untrusted" external network. The adoption of mobile and cloud means that we can no longer have a network perimeter-centric view of security; instead, we need to securely enable access for the various users (employees,...
There's a lot of hype around Zero Trust security, but it's proving to be more than just theory.
In this brief, we review the key takeaways from our recent webinar Zero Trust in Practice, including how to align trust with context, the key pain points Zero Trust can address, and the steps to get to a Zero Trust...
Federal authorities and medical device maker Philips have issued security alerts about security vulnerabilities in some of the company's patient monitoring software. Until patches are available, the company is recommending risk mitigation steps.
Consumers hate passwords, criminals love them. And while the journey to passwordless authentication takes time, there are lessons to be learned from major global organizations who have started down the path. Dr. Rolf Lindemann of Nok Nok Labs shares insights.
Fraudsters' methods of attack are evolving. Download this guide to learn how to detect account takeover attacks with adaptive MFA, risk analytics, and machine learning.
In this eBook, you will learn:
6 fraud techniques that lead to account takeover attacks;
How to help prevent attacks on the login process,...
Watch the largest financial cooperative in Southeastern Washington explore how they were able to find solutions and secure their customer's concerns on privacy, security, and protection of their financial information.
The need for enhanced business agility and secure remote access to support digital transformation has led to the adoption of the security access service edge, or SASE, model, says Rajpreet Kaur, senior principal analyst at Gartner.
The new work reality has created a change in how information is accessed and used, and attackers are targeting remote users with increasing frequency and efficiency. This has brought on a new shift in the IT paradigm which requires identity to act as the central control point in defining an enterprise security...
Implementing an adaptive, risk-based authentication process for remote system access is proving effective as more staff members work from home during the COVID-19 pandemic, says Ant Allan, a vice president and analyst at Gartner.