You searched for identity management/ | SC Media

Your search for identity management/ returned 9 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Last 30 days remove

Your search for identity management/ returned 9 results

Sort Results:

Relevant Recent
WebCast

Building a Better Identity Management Roadmap

The way organizations operate and process information has drastically changed over the last six months as the global economic and health crisis has resulted in job losses, an expanded remote workforce, and increased use of temporary staff. One important byproduct of this shift: Security leaders are rethinking their approaches to access control. Even in the best of circumstances, ensuring effective oversight of digital identities is among a security leader’s most daunting responsibilities. Innovations in contextual and biometric authentication remain promising — though the latter must confront increased social and legal resistance — but the growing complexity of internal and external networks we rely on keeps the bar high.
WebCast

Identity Crisis: Solved?

We talk a lot about how passwords are obsolete, easy to breach, and generally just an obsolete technology that should be replaced. Yet many companies are hesitant to engage in emerging identity management technology because of the costs, the complexity of replacing one identity access management approach with another, and the challenge of layering on new IAM without breaking existing identity products — the management can be a monumental challenge.
WebCast

Making Customer-focused Identity Simple

Connecting outsiders to a corporate network today is more problematic than ever, and it’s more than just employees working from home. Consumer-to-business accounts, such as customers logging in to make a purchase or reviewing their medical charts, or business-to-business portals in order to collaborate and service accounts, are being stressed at a much greater level today. We've all seen the chaos that can occur when companies that manage managing millions of user accounts, such as an entertainment channel, are breached and private data revealed.
Perspectives

Navigating through the mind of a 2020 hacker

When someone gets notified that they have been impacted by a data breach, many people picture a hooded figure in a dark basement with lines of code streaming across a computer screen. Contrary to popular belief, cyberattacks are rarely carried out by a sophisticated cyber-assassin looking to destroy a business. Most of the time they…
Data Breach, Government, Security News

All eyes on VA security measures after compromise of 46,000 accounts

The U.S. Department of Veterans Affairs (VA) disclosure that the information of 46,000 U.S. service people recently was breached through an apparent social engineering scheme underscores the need for government vigilance even when a significant investment has been made in state-of-the-art protection. Security experts said the relatively low number of impacted accounts – in comparison…
Perspectives

Maximize zero trust security by expanding beyond basic principles

The pandemic has fundamentally changed how security teams think about protecting the business, in many cases accelerating digital transformation projects and placing renewed emphasis on the Zero Trust model for information security. As security teams implement Zero Trust, it’s important to consider access management and control. In doing so, this reflects a larger shift in…
APTs/cyberespionage, Corporate News, Government, Privacy & Compliance News and Analysis, Security News

Oracle will inherit TikTok security, privacy headaches

By partnering with the popular Chinese videosharing platform TikTok, Oracle will inherit a laundry list of security and privacy issues once the deal is approved, as soon as Sept. 20, by TikTok parent company ByteDance. TikTok boasts 100 million users in the U.S. and 689 million globally. Earlier this year President Trump threatened to ban…
Product Review

Barracuda CloudGen Firewall F280 v8.03

Barracuda CloudGen Firewall F280 identifies and blocks advanced evasion and obfuscation tactics, enhancing network security with comprehensive and real-time network protection. This multi-layered security product examines packets as they are passed and opened and then cross-references protocol-compliant packages with defined firewall rules. The high performance, stateful, deep packet inspection engine protects against a broad range…
Next hm-product-review in Reviews