The Future of Unified Workplace Access
A Vision for a Unified Physical Identity and Access Management for Financial Institutions Vision for a Unified Physical Identity and Access Management for Financial Institutions
Banks and financial institutions are undergoing a physical transformation and rebirth. As cyber...
As more organizations rely more heavily on cloud-based applications as a result of a remote workforce, they must avoid taking identity and access management shortcuts, says James Gosnold of the cloud consultancy CloudKubed, who calls for the addition of another layer of authentication.
The massive shift to remote working as a result of the COVID-19 pandemic means more organizations are adopting the "zero trust" model, taking such steps as implementing proper access controls, monitoring user behavior and building data governance policies.
Mphasis, the IT service management company, has made many adjustments to its risk management strategy - including wider use of multifactor authentication - as a result of more staff members working from home, says Sethu S. Raman, senior vice president and chief risk officer.
ARCHER, a British high-performance computing system for academic and theoretical research, has been offline since May 11, when a "security incident" forced the University of Edinburgh to take down the supercomputer. The security incident also affected supercomputers in other parts of Europe, university officials say.
The COVID-19 pandemic caught many global enterprises by surprise. But as they prepare to emerge from quarantine and reopen their doors, they are taking a thoughtful approach to bolstering cybersecurity for on-premise and remote workers alike. Pamela Kubiatowski of Zscaler shares insights.
Security experts and law enforcement officials have long argued that paying ransoms doesn't pay. For starters, it directly funds the cybercrime ecosystem and makes it attractive for criminals to keep launching ransomware attacks.
What does workforce authentication look like today? And as this remote workforce becomes the norm, how do you envision workforce authentication in five years? These are the questions posed by Jeff Carpenter of HID Global in an upcoming roundtable discussion.
Enterprises are approaching customer identity and access management from multiple angles, and maturity is growing. These are takeaways from a recent roundtable discussion of CIAM myths and realities. Keith Casey of Okta discusses this event and his vision of CIAM.
In a video interview, a panel of experts describes why implementing a "zero trust" architecture for the remote workforce during the COVID-19 pandemic requires redefining access control and security strategies.
Microsegmentation is an essential element of a "zero trust" approach to security, says Ritesh Mishra, global head, IT infrastructure and security at Dr. Reddy's Laboratories, who explains why in this interview.
Web hosting giant GoDaddy confirms that a data breach has affected about 28,000 of its customers' web hosting accounts, according to a news report. The company has reset passwords and usernames for some customers as a precaution, although it says no data appears to have been altered.
Enterprises have long used Virtual Private Networks to promote connectivity and security. But as the gatekeeper to internal resources, VPNs can be a target for attackers looking to gain access to sensitive data. It's essential organisations take steps to secure VPNs to protect against unauthorised access and data...
An operational risk management framework should live at the core of every effective information security program and strategy. Rather than security professionals scrambling to secure every application and system with the highest grade of technologies and drowning their resources, risk management enables better...
Over the course of three days, ISMG and SecureAuth teamed up for a series of virtual roundtable discussions on the future of identity security. Bil Harmer of SecureAuth reflects on these discussions and how they inform his view of the factors influencing both the present and future of identity.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.