Digital transactions and interactions have experienced unprecedented growth, driven by the evolving digital landscape and changing consumer behavior. The COVID-19 pandemic accelerated this transformation, compelling even traditionally offline businesses to establish a digital presence and offer mobile apps and online...
Flipkart embraced a comprehensive security maturity program that incorporated defense-in-depth, automation, zero trust and secure SDLC/security-by-design principles across its four subsidiaries. Flipkart's Raakesh Thayyil discussed the importance of a cohesive strategy.
In a recent study it is shown that 85% of customers who fall victim to identity theft and identity fraud would avoid using a brand after losing trust.
In today’s Digital World, customers expect to keep them and their digital transactions safe. Additionally identifying the person attempting to access your...
Organizations must extend identity protection beyond employees to safeguard contractors, supply chain partners, software bots and intelligent devices, said SailPoint CEO Mark McClain. Businesses struggle to keep up with what applications or data non-employee or non-human identities need access to.
Thoma Bravo has agreed to spend $12 billion on three high-profile identity acquisitions to help with the transition from on-premises licenses to cloud-based subscriptions. Vendors in the space must expand their customer success organization and shift incentives for the salesforce, said Chip Virnig.
Effective security governance in a healthcare entity is a balancing act that requires sponsorship by top leadership and careful consideration of the concerns of clinicians and others in the organization, according to Eric Liederman and deputy CISO Steven Frank of Kaiser Permanente.
The European Parliament on Thursday approved legislation creating a continentwide framework for digital identity that European leaders hope will diminish the role of big tech companies such as Google and Apple. Members of the European Parliament have pushed for additional privacy measures.
Spoiler alert: In 2022, audits found open source in 100% of our customer engagements.
Since open source usages are now so pervasive, companies are increasingly concerned about the security of applications built on the foundation of open source components. Consequently, open source security and license compliance...
Okta Identity Governance has enjoyed success in its first quarter of global availability as businesses unify access management and governance. Okta is surprised by the amount of traction its governance offering has gained with large enterprises and in competitive bake-offs, says CEO Todd McKinnon.
Today’s global fraud outlook sits at the intersection of market volatility, accelerated digital transformation and consumer vulnerability. Cybercrime-as-a-service plug and
play technology tools are making it easier than ever for even unsophisticated fraud rings to launch and scale costly attacks.
The...
Okta will execute the third-largest round of layoffs of any cybersecurity company in the current economic downturn, axing 300 workers following customer identity execution challenges. The identity giant plans to reduce its staff by 5% in a push to reduce operating expenses and improve profitability.
Radiant Logic has agreed to buy Brainwave to move from an attestation-based identity governance model to one that more rigorously ensures the appropriateness of credentials. Brainwave uses data and AI to tell customers where in the organization user identities are most likely to be out of sync.
Privileged access management vendor Delinea has hired longtime RSA sales leader David Castignola to expand beyond North America as well as in nonregulated industries. Delinea hopes to increase sales beyond verticals such as financial services, banking, healthcare, insurance and the public sector.
SailPoint has made its first acquisition since joining Thoma Bravo, scooping up a third-party identity risk startup established by a Massachusetts Air National Guard veteran. Buying SecZetta will give customers more visibility into employee, third-party contractor and temporary worker identities.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.