Two recent Department of Homeland Security advisories pertaining to vulnerabilities in certain ultrasound systems from a major medical device maker - and multiple flaws in an open-source hospital information management system - highlight the range of security risks spanning various segments of the healthcare sector.
As we begin the second half of 2020, organizations must find ways to ensure their customers can engage with services at any time, from any device, securely. Enter: Customer identity and access management. In a preview of an upcoming roundtable, Okta's Keith Casey discusses CIAM maturity.
Joni Brennan, president of the Digital ID & Authentication Council of Canada (DIACC), says identity management is a core component to building a solid foundation for a socioeconomic safety net, particularly during a pandemic. However, engagement and education are also vital components to establishing a strong...
Convenience and security are both critical as your customers traverse from one stage to the next of their journey with your brand. Customer identity is at the intersection of security and convenience - it can make or break either side of that equation. When security often comes at the cost of convenience, how do you...
The year 2020 will be remembered as the landmark date when enterprises strove for business resilience and achieved digital transformation. Heading toward 2021, how can enterprises continue to evolve and provide value? Pamela Kubiatowski of Zscaler offers guidance.
The latest edition of the ISMG Security Report discusses global progress on adopting standard digital identifiers. Plus, a former cybercriminal discusses emerging fraud trends, and an update on the evolution of e-signatures.
Implementing trusted digital IDs will create benefits for end users as well as service providers, says Nick Mothershaw, chair and executive director at the Open Identity Exchange. But widespread international adoption of such IDs will take time to achieve, he acknowledges.
With 82 per cent of CISOs feeling burnt out, what's going on in the cyber industry to cause this? And what can be done to stop CISO burnout? The Cybersecurity special report, published in The Times, explores the cybersecurity industry from C-suite roles to cyber threats while working from home.
Read this report to...
Japan has been scanning its entire IPv4 address space to find insecure home routers, web cameras and sensors. The results are encouraging, and the country's program could serve as a model for other nations aiming to avoid large-scale IoT security problems.
This edition of the ISMG Security Report analyzes whether IoT devices will outlive their security updates. Also featured: Why security spending needs to shift further upstream; could banks be custodians of identity?
It's a good time to be a CISO. You have the board's attention, and now you can use your position to ensure appropriate resources to tackle key challenges such as identity & access, cloud application security and third-party risk. Expel CISO Bruce Potter discusses how best to influence these decisions.
Organizations deploying deception technology must make sure to integrate it with other technologies to reap the full benefits of intrusion alerts, says Anuj Tewari, global CISO at IT Services HCL Technologies.