You searched for identity management/ | SC Media

Your search for identity management/ returned 9 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Last 2 years remove

Your search for identity management/ returned 9 results

Sort Results:

Relevant Recent
WebCast

Identity and Access Management: Rethinking your organization’s approach to insider threats

Insider threats are among the most difficult cyber risks to detect and prevent — and getting identity and access management (IAM) right is an essential step in keeping them at bay. The shift by many organizations to predominantly remote workforces has compounded the issue, with larger organizations especially vulnerable as the number of entry points to their networks has increased.
SC Awards

The 2020 Trust Award winners

Here’s a look at which solutions took home the top Trust honors and why, and what some of the winning companies have experienced in the months since the award presentation in February.
Perspectives

It’s finally time to go passwordless

The death of passwords has been predicted time and again. Not without good reason: passwords are a weak link and a headache from both a security and operational perspective. But despite calls for their elimination, most people still use passwords today. Why has the passwordless dream not come to fruition yet? Why is now different?…
Perspectives

What security pros can learn from space travel

Humans have always been fascinated with space travel, and that’s why more than 10 million people tuned in earlier this year via livestream to watch NASA and SpaceX launch astronauts Robert Behnken and Douglas Hurley to the International Space Station (ISS). These two astronauts followed in the footsteps of others who have had the honor…
Perspectives

Lock down home workers with a mix of tech tools and policies

Security pros face unending attacks and challenges as they try to maintain business continuity while employees work-from-home. Now that the majority of the staff works beyond the network perimeter, the escalating threats are real, driving opportunistic threat actors to ramp up their phishing efforts. For example, Google found earlier this year that 18 million phishing…
Perspectives

How to make security simple for IT users

Companies could make corporate IT environments a lot safer from external threats if those pesky humans would stop clicking on so many sketchy links. Or sharing passwords. Or using bad passwords. Or finding loopholes in the corporate security policy. Users tend to carry their fair share of blame for data loss and cyberattacks. Human error…
Next post in Perspectives