The COVID-19 pandemic caught many global enterprises by surprise. But as they prepare to emerge from quarantine and reopen their doors, they are taking a thoughtful approach to bolstering cybersecurity for on-premise and remote workers alike. Pamela Kubiatowski of Zscaler shares insights.
What does workforce authentication look like today? And as this remote workforce becomes the norm, how do you envision workforce authentication in five years? These are the questions posed by Jeff Carpenter of HID Global in an upcoming roundtable discussion.
In honor of World Password Day, here's a task for every organization that uses remote desktop protocol: Ensure that all of your organization's internet-facing RDP ports have a password - and that it's complex and unique.
Over the course of three days, ISMG and SecureAuth teamed up for a series of virtual roundtable discussions on the future of identity security. Bil Harmer of SecureAuth reflects on these discussions and how they inform his view of the factors influencing both the present and future of identity.
The latest edition of the ISMG Security Report analyzes the privacy issues raised by COVID-19 contact-tracing apps. Also featured: An update on efforts to fight fraud tied to economic stimulus payments; John Kindervag on the origins of "zero trust."
Enterprises long have practiced workforce identity and access management, but increasingly they are rolling out customer IAM, or CIAM. What's driving the trend, and where should cybersecurity leaders look to assert influence? Keith Casey of Okta explores some CIAM myths and realities.
With a global remote workforce, the concept of secure identity has never been more critical. What is the present and future of identity? In a preview of an upcoming virtual roundtable discussion, SecureAuth's Bil Harmer shares his vision.
Identity and access management for the workforce? Cybersecurity leaders are all over that. But what about customer IAM? There's plenty of room to grow there, judging by Dallas roundtable discussion featuring Richard Bird of Ping Identity and Gray Mitchell of IDMWORKS.
Not knowing where all the data resides in an organization is a major hurdle when it comes to protecting and securing that data, says Prakash Kumar Ranjan, senior manager and lead, IT and information security audit, Airtel Payments Bank.
Ten years since he coined the term "zero trust," John Kindervag, field CTO of Palo Alto Networks, sees CISOs increasingly being faced with the challenge of having to implement the "never trust, always verify" model across increasingly complex IT environments, including cloud and IoT.
Passwords are the access point to almost every system in our environment. Can they ever truly be replaced? John Bennett of LogMeIn talks about the steps necessary to create a secure, passwordless login experience.
The Reserve Bank of India has decided to allow all banks to use remote video-based "know your customer" authentication for onboarding new clients. But some observers say many Indian banks may prove reluctant to use video KYC because they lack the necessary technology and new customers lack smartphones.
Identity and Access Management is at the epicenter of many corporate security vulnerabilities. Markku Rossi of SSH Communications Security discusses how a "Just-in-Time" approach to credential management eliminates standing privileges.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.