Forty-eight percent of customers drop the products and services
of organizations that have had a publicly-disclosed data breach.
This is but one of the findings of the new 2018 Global State of
Online Digital Trust study commissioned by CA Technologies.
The new research study, developed by Frost and...
U.K. health and beauty retailer Superdrug Stores is warning customers that attackers may have compromised some of their personal information, apparently because they'd reused their credentials on other sites that were hacked. While Superdrug quickly notified victims, it stumbled in three notable ways.
Early experiments are demonstrating how blockchain, the distributed and immutable ledger behind virtual currencies, potentially could play an important role in identity management, says Avivah Litan, a Gartner Research analyst who will be a featured speaker at ISMG's Security Summit Aug. 14-15 in New York.
This edition of the ISMG Security Report includes an analysis by Executive Editor Matthew J. Schwartz on President Donald Trump's changing views on election meddling, plus an update on voter data being accidently exposed by a robocalling company.
At the advent of real-time payments, it's more critical than ever for organizations to quickly authenticate users and transactions. And David Vergara of OneSpan says emerging tools build upon legacy technologies to ensure trusted identity with minimal friction.
What are hot cybersecurity topics in Scotland? The "International Conference on Big Data in Cyber Security" in Edinburgh focused on everything from securing the internet of things the rise of CEO fraud to the origins of "cyber" and how to conduct digital forensic investigations on cloud servers.
As businesses evolve to support a complete digital experience, a challenge has emerged to one of the most basic questions of doing business: How can I truly trust I know my customer?
In the world of data breaches and identity theft, legacy programs of identity proofing and authentication do not instill a high level...
In the wake of Equifax and other major breaches, and armed with all of the personally identifiable information that they will ever need and a keen sense of the security controls that modern organizations use, sophisticated fraudsters are finding success as never before. At the center of it all is a new fraud trend:...
Business cases for fraud prevention technologies have typically been based on savings related to fraud management and compliance costs. While these factors may remain of interest, the impact on the customer experience and related operational costs must take precedence.
Download this white paper and learn how to...
Despite the buzz about digital transformation, most enterprises remain overwhelmed by having to support and secure legacy technologies, says Mark Loveless of Duo Security. How can they simultaneously protect their legacy systems while securing their future?
Technology, regulations and customer expectations all have evolved, but what does this mean for how organizations secure identities?
This evolution has proven to be a two-sided coin, particularly for financial institutions. It's not only allowing financial institutions to offer new, innovative products where...
Technology, regulations and customer expectations all have evolved. What does this mean for how organizations secure identities? Baber Amin of the Office of the CTO of Ping Identity offers strategic insight.
Armed with stolen personal data, cybercriminals can easily bypass conventional identity authentication methods. So how can organizations strengthen authentication without harming customer experience? Shaked Vax of IBM Security shares insights.
The technology and operating models for identity and access management have evolved with time, but the way many enterprises approach IAM has not. How can security leaders modernize their IAM strategy in this era of unprecedented complexity? Patrick Wardrop of IBM Security shares insights.
The technology and operating models for identity and access management have evolved with time, but the way many enterprises approach IAM has not. How can security leaders modernize their IAM strategy in this era of unprecedented complexity?
Download this eBook on the path to modern IAM and learn exclusive insights...