You searched for identity management/ | SC Media

Your search for identity management/ returned 14 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Last 2 years remove
Executive Insight remove

Your search for identity management/ returned 14 results

Sort Results:

Relevant Recent
Executive Insight, Opinion, Perspectives

5 Tips for Safer Zoom Calls at Your Company

Zoom has emerged as a poster child for video conferencing in our new work-from-home economy. As much of a cultural icon Zoom has become during the Covid-19 period, the company has faced some serious security issues. Cybersecurity firm Cyble released a report in mid-April detailing that a credential stuffing campaign compromised some 500,000 Zoom accounts…
Executive Insight, Opinion

5 Steps organizations should take to ensure CCPA compliance

Now that the California Consumer Privacy Act has officially taken effect, follow these 5 steps to ensure compliance, even if your organization is outside the Golden State. According to the Identity Theft Resource Center, more than 164 million consumer records containing personally identifiable information (PII) were exposed in data breaches in 2019. Seemingly every week…
Executive Insight, Opinion

How insurance CISOs can address cloud migration security concerns

The cloud is hardly new for most industries, but insurance is still in its early days with respect to widespread adoption. While solid progress is being made—a recent report from Novarica shows that more than 70% of insurers now use cloud computing (more than triple the last few years)—most have implemented it only in segments…
Executive Insight, Opinion

What is the Zero Trust Framework in cybersecurity and 5 considerations for building a Zero Trust IT environment

What is Zero Trust? Zero Trust isn’t a product or service, and it’s certainly not just a buzzword. Rather, it’s a particular approach to cybersecurity. It means exactly what it says – not ‘verify, then trust’ but ‘never trust and always verify.’ Essentially, Zero Trust is about protecting data by limiting access to it. An…
Executive Insight, Opinion

The inside scoop on insider threats

Cybercriminals continue to develop new attack methods that pose a serious risk to enterprise security, but they are not the only threats enterprises need to defend against. Employees – whether well-meaning but careless or those with malicious intentions, pose a great risk. In fact, insider threats are among the leading causes of data breaches. Verizon’s…
Executive Insight, Opinion

Security perimeters in the cloud aren’t dead—They’re ephemeral

It goes without saying that companies migrating IT systems and operations to the cloud face a growing number of challenges related to security. From securing cloud-native applications in a continuous release environment to managing digital identity and remote access to sensitive data, virtually every aspect of day-to-day IT and cybersecurity operations is changing rapidly.  With…
Executive Insight, Opinion

The evolution of shared responsibility in cloud security

Businesses are conflicted about moving their data to the cloud. Some claim that one of the main reasons for moving data to the cloud is because it is more secure. Simultaneously, a top reason for not moving data to the cloud is due to concerns about security. Which opinion is right? The answer isn’t so…
Executive Insight, Opinion

A new way to think about security in autonomous systems: Don’t

The age of autonomy is upon us. While talk of autonomous cars in the not-too-distant future captures the imagination, the reality is that autonomous systems are very much with us in the present day. We see it in the robots that are packing parcels in an online retailer’s warehouse, or welding car parts on an…
Executive Insight, Opinion

Identity access management – An auditor’s view

This article addresses the key concern that organizations of all size must contend with, i.e. lack of effective Identity and Access Management (IAM) processes. The risk of not having a robust IAM system may lead to severe consequences, some of which include loss of data confidentiality, integrity, and even availability. This can inflict irreparable harm to…
IllenaArmstrong
Editorial Honeypot, Executive Insight, Opinions

Still growing after 30 years

This year has proven to be one of continued personal and professional growth for many industry friends, colleagues and me. Yet, even with the positives faced this year, there have been some of those opposing negatives. No wonder, then, there are those among us who might be just about done with 2019.    After all, cyberattackers kicked of…
Next post in Opinions