The latest edition of the ISMG Security Report discusses global progress on adopting standard digital identifiers. Plus, a former cybercriminal discusses emerging fraud trends, and an update on the evolution of e-signatures.
This edition of the ISMG Security Report analyzes whether IoT devices will outlive their security updates. Also featured: Why security spending needs to shift further upstream; could banks be custodians of identity?
Enterprises need to move away from manual threat detection methods to leverage artificial intelligence, which can help boost defenses, says Dr. Jassim Haji, president of Artificial Intelligence Society, Bahrain Chapter.
Emerging passwordless security standards elevated consumer and consumer-like experience expectations, and ballooning costs have moved to eliminate passwords from a theoretical concept to a real possibility.
Read this guide to:
Explore the case for going passwordless for both customer and employee authentication;
Organisations want their dev teams to roll out great new experiences that attract and retain customers while improving their lifetime value. However, today's end users are trained by the Googles, Amazons, and Facebooks of the world to disengage from experiences that aren't technologically advanced, frictionless,...
To date, most organisations have had hard boundaries between system administrators and their software development teams, where they occasionally interact, rarely coordinate, and never collaborate. As the needs for collaboration between IT administrators and software developers - both internal and external - continue...
Southeast Asia has become a hotbed for cybercrime activities, says Anthony Bargar, former deputy CISO of the U.S. Department of Defense, who says enterprises in the region need to take a collaborative defense approach to respond to this new threat environment.
Addressing digital payment security challenges requires having good identity verification capabilities as well as a strong authentication process that's friction-free for consumers, says Singapore-based Gautam Aggarwal, senior vice president and regional chief technology officer, Asia Pacific, at Mastercard.
For an upcoming virtual roundtable, Alex Laurie of ForgeRock discusses the importance of digital identity management, the need for organizations to quickly and accurately register people, comply with privacy regulations and define and manage the level of risk involved.
A robust customer identity and access management strategy is critical to digital success for today's financial institutions. Eugenio Pace of Auth0 and Paul Bedi of IDMWORKS discuss CIAM in the age of the remote worker.
Too many enterprises remain chained to outdated and vulnerable identity and access management technologies - legacy systems that rely on passwords, eat budgets and kill productivity. Baber Amin of Ping Identity and Cody Cook of ProofID preview a new virtual roundtable on Modern IAM.
A shift to passwordless authentication would help mitigate the risk of phishing attacks and identity theft, says Malaysia-based Shankar Krishnan, CISO and head of information security at Axiata Digital, who offers implementation insights.
The latest edition of the ISMG Security Report sizes up progress made so far on identity management and the work yet to be done. Also featured: how security concerns are holding back IoT projects and the privacy issues raised by recording videoconferences.
Purpose-built backup appliances (PBBAs) have been foundational components to many organizations' backup/recovery infrastructure for more than a decade. The importance of PBBAs is illustrated in the numbers: According to IDC, in 2019, the data replication and protection (DR&P) market was approximately $9.2 billion,...