You searched for identity management/ | SC Media

Your search for identity management/ returned 78 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Last 2 years remove
Doug Olenick remove

Your search for identity management/ returned 78 results

Sort Results:

Relevant Recent
Page

2020 SC Awards Trust Awards Finalists

Best Authentication Technology Cisco Systems ForgeRock Jumio RSA SecureAuth Best Business Continuity / Disaster Recovery SolutionArcserve Deloitte & Touche and Dell Technologies Onspring Quest Software Semperis Best Cloud Computing Security SolutionBitglassCentrifyCipherCloudIllumioMimecast Best Computer Forensic Solution AccessData – AD EnterpriseAccessData – Forensic Toolkit (FTK)EndaceOpenTextVectra Best Database Security Solution Baffle comforte AG Imperva MarkLogicPenta Security Systems Best…
Events, Security News

SC Media opens nominations for the 2020 SC Awards

SC Media is announcing a call for nominations for the 2020 SC Awards, which will be bestowed to the winners during a gala dinner celebration, to be held in February 2020 in San Francisco. The cybersecurity community is encouraged to submit nominations for its best and brightest companies, technologies and individuals in the following categories:…
Page

SC Media Reboot Leadership Awards – Top Managers

Lorelei Chernyshov, Merrick Bank Driven by impending changes wrought by new regulations such as GDPR and the California Consumer Privacy Act (CCPA), Lorelei Cheryshov has focused on leading the integration of information assets with cybersecurity practices to better manage sensitive data location, accessibility and storage at Merrick Bank. Complete Profile… Kevin von Keyserling, Keyfactor Since…
Reboot Leadership Awards 2019

Roger Grimes – KnowBe4

Why Nominated: Roger Grimes is a 30-year computer security professional and prolific author frequently consults with the world’s largest and smallest companies and militaries. Profile: In his role as an advocate, Roger Grimes spreads his message on the importance of cybersecurity to the community at conferences such as RSA, Black Hat, Tech Mentor, Tech Ed, SecTOR, AusCERT…
Executive Insight, Opinion

A new way to think about security in autonomous systems: Don’t

The age of autonomy is upon us. While talk of autonomous cars in the not-too-distant future captures the imagination, the reality is that autonomous systems are very much with us in the present day. We see it in the robots that are packing parcels in an online retailer’s warehouse, or welding car parts on an…
Executive Insight, Opinion

Identity access management – An auditor’s view

This article addresses the key concern that organizations of all size must contend with, i.e. lack of effective Identity and Access Management (IAM) processes. The risk of not having a robust IAM system may lead to severe consequences, some of which include loss of data confidentiality, integrity, and even availability. This can inflict irreparable harm to…
Reboot Leadership Awards 2019

Kevin von Keyserling – Keyfactor

Why Nominated: Since founding his company in 2004, Kevin von Keyserling has transformed Keyfactor (formerly Certified Security Solutions) from a security consultancy to a digital identity management solutions provider that manages more than 500 million digital certificates for companies around the world. Over the last year, he closed the Cleveland, Ohio-area company’s largest funding round to…
Executive Insight, Opinion

5 Steps organizations should take to ensure CCPA compliance

Now that the California Consumer Privacy Act has officially taken effect, follow these 5 steps to ensure compliance, even if your organization is outside the Golden State. According to the Identity Theft Resource Center, more than 164 million consumer records containing personally identifiable information (PII) were exposed in data breaches in 2019. Seemingly every week…
Executive Insight, Opinions, Security News

Using Social Auth with Your App? 4 Steps to Protect Your Users and Mitigate Security Concerns

By Keith Casey, Okta API Problem Solver Another day, another breach headline. What’s unique about the latest Facebook breach is that it’s the source of truth for many other companies and applications who use social platforms for authentication. A vulnerability in a social authentication service has far-reaching effects across thousands of apps and millions of users.…
Next post in Executive Insight