"Multisectoral" authentication can help to ensure that government benefits are provided to the right recipients, says Joni Brennan, president of the Digital ID & Authentication Council of Canada.
In 2020, the "zero trust" conversation evolved from "What is it?" to "How do we achieve a zero trust architecture?" Chase Cunningham, principal analyst serving security and risk professionals at Forrester, offers an outlook for what we can expect in 2021.
What's needed to make a shift from traditional IAM to CIAM? To start, an organization needs to look at fraud detection solutions and risk-based authentication technologies such as device intelligence and behavioral biometrics, says David Britton of Experian.
Data collected through customer identity and access management can play an important role in fraud investigations, says Simon Marchand, chief fraud prevention officer at Nuance Communications.
An investigation at the U.S. Treasury Department has found that it suffered a "significant" breach as a result of the SolarWinds Orion supply chain attack, a top Democrat on the Senate Finance Committee reports. Meanwhile President-elect Joe Biden said of the attack: "I promise you, there will be a response."
Identity and access management (IAM) can be hard to explain and even harder to understand. What is IAM and why is it so important? IT jargon aside, check out the latest interactive whitepaper for a helpful and easy to use metaphor for understanding IAM. Treat your organization like an airport; give the right people...
See why Forrester analysts rank IBM as a Leader for risk-based authentication in this new report. We believe that IBM's integration of our fraud protection and access management technology, advanced authentication options, and risk-based adaptive access capabilities helped us earn this recognition.
Register now to...
Multi-cloud and hybrid cloud solutions are great enablers for organizations, but managing IAM across multiple entities that are ever expanding in capability and use? Big challenges. But here's an opportunity to re-do enterprise IAM. Join Tom Malta of Navy Federal Credit Union for insight on:
Business...
Why identity is your #1 security problem
Watch the Computer Weekly interview
Bryan Glick, editor-in-chief at Computer Weekly, speaks to Okta's Max Faun about identity and security, covering:
Why 81% of cybersecurity breaches are password-related
How Customer Identity and Access Management (CIAM) can help you...
Critical authentication vulnerabilities contained in certain GE Healthcare medical imaging products could allow attackers to gain access to sensitive patient data, alter data and affect the availability of the equipment, according to new advisories from the vendor and the U.S. Department of Homeland Security.
Customer engagement is an important metric for success, but just how important is it? To find out, Okta surveyed 100 engineering executives from enterprise organizations, and learned that today’s customers expect technology to be fast, frictionless, omni-channel, and secure.
Securely connecting users to applications is not a new problem, and to address this challenge, organizations traditionally adopted Web Access Management (WAM) solutions to secure login and reduce friction for users when accessing web applications on-premises.
The Okta Platform and migration strategy offers a...
Identity attacks such as phishing, credential stuffing, brute-force-attacks, etc. are increasingly common and sophisticated methods for committing account takeovers. These attacks result in increased security risks, brand damage and outright fraud.
Additionally, today’s customer expects seamless access with...
As the leader in identity and access management (IAM), Okta has worked with thousands of companies to achieve their security and usability goals. We’ve learned that no matter how far along each company is on their identity journey, there’s a common set of challenges they face at every step.
In this eBook, we...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.co.uk, you agree to our use of cookies.