The road to Zero Trust starts with an entry point on the road map. But what are the common entry points, and how might the journey unfold? Satish Gannu, CTO-Digital of Korn Ferry, discusses the Zero Trust road map with Paul Martini, CEO of iboss.
Applying cloud access security broker’s three functionalities - API-level integration with managed device transfer for visibility, in-line CASB for proxy and other devices, and its control over cloud and other access points - helps provide better control and the ability to protect and secure user access, says Thomas...
For Santosh Kamane, head cybersecurity, risk management and business continuity at DBS Asia Hub 2, privacy regulations play a huge role in improving the security posture of enterprises, including banks.
CISOs need to harden the algorithms written for artificial intelligence, as cybercriminals always leverage AI to launch a zero-day vulnerability, says Manojkumar Parmar, technical global program director at Bosch.
The critical importance of cybersecurity has come to the forefront in 2021 for customers of managed service providers, or MSPs.
Online security has become a “must-have” that MSPs’ customers are willing to pay for - especially when it drives operational efficiencies that can provide longe- term cost savings by...
As cloud email security implementations become more popular, security and risk management professionals are taking an in-depth look at their capabilities. Cloud-based security solutions deployed through APIs instead of a gateway are easier to implement and provide more comprehensive protection.
To find out how to...
Jeremy Grant, coordinator of the Better Identity Coalition, joins three ISMG editors to discuss important cybersecurity issues, including how the Biden administration’s executive order will advance the identity cause, and whether we are any closer to finally abandoning the password.
While there are many solutions that claim to simplify certificate lifecycle management, not all of
them are built to address the unique complexities of today’s expansive and distributed digital
When evaluating a certificate management solution, it is important to look for
key capabilities that...
With the support of the recent executive order on improving the nation's cybersecurity, Zero Trust strategy is gaining greater recognition. But there is still a degree of resistance to Zero Trust adoption. Dr, Chase Cunningham, CSO of Ericom, discusses this and other issues around Zero Trust.
The time for Machine Identity Management is NOW. Hear from 1,000 security and public key infrastructure (PKI) professionals on how automation and SaaS redefine Next-Gen Machine Identity Management.
Download the 2021 report now.
In October, Missouri's governor accused a journalist of hacking after he alerted the state to exposed personal information on a state education website. Now, emails reveal that state planned on thanking him before it chose to pursue prosecution and that the FBI immediately dismissed the incident.
A comprehensive IAM program requires integration with HR and legacy systems to enable multifactor authentication, SaaS, and Identity-as-a-Service to provide secure user access and a secure user experience, says Hong Kong-based Varun Kakkar, group head of cybersecurity at Tricor Group.
The FBI says it has fixed a software misconfiguration that was abused to send fake emails falsely warning of a cyberattack. As many as 100,000 hoax emails were sent in two waves early Saturday morning, originating from a legitimate FBI domain.
A well-defined Identity Security strategy offers modern enterprises the peace of mind that their most critical assets are secure while accelerating business agility. But putting a plan in place that effectively secures the expanding number and types of identities can feel daunting. Where do you start? How do you...
With perimeter-focused architectures quickly becoming irrelevant, enterprises are looking toward identity-focused security measures to protect new “perimeterless” networks and new forms of working.
Identity Security for Dummies is a primer on securing digital identities across the enterprise.