Authentication innovation is still in its infancy, and most companies are still combining more traditional passwords and PINs with cutting edge
biometrics or contextual decisioning methods. The combination brings new capabilities to multi-factor authentication, but doesn't necessarily produce the best possible...
The digital shift is increasing the need for more sophisticated privacy and data protection measures. Several major institutions have seen their information security compromised in recent years as cyberattacks and fraudulent activity show no sign of slowing down. With PSD2 regulations now in effect, companies are in...
As cloud computing services evolve, the cloud opens up entirely new ways for potential attacks. Cloud systems and images have operating system and component vulnerabilities just like those in the enterprise. For example, Heartbleed, Shellshock and other major bugs can affect cloud systems, and there are new issues to...
The consumerization of the enterprise represents both a challenge and an opportunity for IT. Implementing a digital workspace solution can help IT harness the rapid changes brought about by consumerization and address the needs of the full range of users and use cases within the business.
Download this whitepaper...
For organizations that are embracing cloud and virtualized environments, three common-sense steps are proving to be key for providing the visibility and control needed to maximize security across modern IT environments.
Download this eBook to learn how you can implement these steps in your organization.
VMware...
Blockchain technology already underpins the boom in cryptocurrencies, but it is also being rigorously tested and developed for other applications, including identity and access management. Such projects could make personal data easier to secure and less vulnerable to data breaches.
True "next-generation" multi-factor authentication (MFA) platforms should be well equipped to manage the customer experience while providing the right level of security assurance at the right time, anytime.
Download this e-book and learn ten criteria to look for in a robust MFA platform, including:
Decentralized,...
Technologists are wrangling with an identity puzzle: Is it possible to create a single digital identity that can be seamlessly and securely used at a bank, a hospital or consumer websites? It's the holy grail of identity. But experts say blockchain is likely not the answer right now.
To address growing concerns about Aadhaar, the Unique Identification Authority of India, which administers the ID program, is taking two key steps to add a layer of security. But some observers are already questioning whether the move will prove effective.
Following the alert over Meltdown and Spectre vulnerabilities, the U.K. Information Commissioner's Office is warning that failures to patch today could be punished with fines under GDPR once enforcement of the data protection law begins later this year.
After news of yet another apparent Aadhaar-related data breach, some security experts are once again calling for the government to substantially beef up security for the identification system.
From worsening ransomware attacks to deepened concerns about external digital risk, former AT&T CISO Ed Amoroso says 2018 will be a challenging year, and security teams need to be building out their resiliency plans to prepare for what's ahead.
A successful privileged access management program has many critical components, including single sign-on, password management and provisioning and maintenance of privileged identity, says Anuj Tewari of HCL Technologies.
In the Face of Advanced Threats, is Your Organization's Security Posture Reactive or Proactive?
Today's most advanced threat actors - whether external or internal - are stealthier than ever and able to hide within one's systems for days, weeks or even months as they gather intel and prepare to strike. Sixty-one...
This eBook introduces IT professionals to next-generation multi-factor authentication (MFA), an approach to authentication that goes well beyond usernames and passwords to provide the right level of security assurance at the right time, anytime. Next-generation MFA also streamlines authentication while empowering...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.