Identifying and fixing security gaps in a cloud architecture may not appear very different from doing the same for on-premises environments. But there are a variety of nuanced differences that can be easy to overlook. If you fail to appreciate and account for them, these misconfigurations can cause security blind...
The Forrester Report outlines 10 core functional areas of identity management and governance (IMG) and provides the best practices for building and operationalizing an effective IMG program across each functional area.
Key Findings of the report:
Rightsize user roles to overcome overprovisioned group...
According to Gartner security and risk management (SRM) leaders responsible for identity and access management (IAM) and fraud detection should "Target a SaaS or cloud-based deployment first, dropping back to on-premises only if there are specific needs that cannot be overcome or addressed."
Key Findings of...
The Public Sector’s Path to Modern Customer Identity and Access Management
Over a decade ago, the federal government recognized the need for greater security through identity management by instituting the Federal Identity, Credential, and Access Management (FICAM) architecture. FICAM comprises the tools, policies,...
"Multisectoral" authentication can help to ensure that government benefits are provided to the right recipients, says Joni Brennan, president of the Digital ID & Authentication Council of Canada.
In 2020, the "zero trust" conversation evolved from "What is it?" to "How do we achieve a zero trust architecture?" Chase Cunningham, principal analyst serving security and risk professionals at Forrester, offers an outlook for what we can expect in 2021.
What's needed to make a shift from traditional IAM to CIAM? To start, an organization needs to look at fraud detection solutions and risk-based authentication technologies such as device intelligence and behavioral biometrics, says David Britton of Experian.
Identity management will be at the forefront of securing remote work in the coming year. Jason Bohrer, new leader of the Secure Technology Alliance and the U.S. Payments Forum, describes key initiatives as he steps into this role.
Data collected through customer identity and access management can play an important role in fraud investigations, says Simon Marchand, chief fraud prevention officer at Nuance Communications.
The security challenges presented by the COVID-19 pandemic, including managing a remote workforce, point to the need to prioritize identity management, say Rebecca Archambault of Blue Cross Blue Shield and Jeremy Grant of the law firm Venable.
The Identity Governance and Administration (IGA) market is continuing to evolve through more integrated Identity Provisioning and Access Governance solutions that are now increasingly aided by intelligent features. This Leadership Compass will give an overview and insights into the IGA market, providing you a...
Why identity is your #1 security problem
Watch the Computer Weekly interview
Bryan Glick, editor-in-chief at Computer Weekly, speaks to Okta's Max Faun about identity and security, covering:
Why 81% of cybersecurity breaches are password-related
How Customer Identity and Access Management (CIAM) can help you...
In the current era of instant consumer gratification, business-to-consumer (B2C) brands are jostling to deliver top-notch customer experiences that span online, offline, social media, the Internet of Things (IoT), and even virtual reality (VR) interactions.
In order to not just survive, but thrive in this...
Every company must become a technology company. Your customer’s requirements are changing with the explosion of channels, devices, platforms and touchpoints. And secure experiences with those interactions is paramount.
CIAM is foundational technology that meets increasingly complex customer requirements and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.