Tag "Identity Management"

Back to homepage
Software

You are who you say you are: Establishing digital trust with the blockchain

Over the last few years, blockchain use has gained popularity driven partly by the interest in cryptocurrency, but mostly with the growing understanding of what distributed ledger technology can enable through decentralization

Identity Theft

What is IAM? Identity and access management explained

Identity and access management (IAM) in enterprise IT is about defining and managing the roles and access privileges of individual network users and the circumstances in which users are granted

Software

Why identity verification needs to be a part of your digital transformation strategy

Smartphones and tablets are an indispensable part of daily life, and consumers expect nothing less than a streamlined mobile experience. With this in mind, businesses are focusing on digital transformation efforts in

Software

Application Security: How to Secure the Many Apps in Your Enterprise

Today’s enterprises are struggling to secure their applications. With thousands of applications in use and new threats emerging daily, large organizations face a monumental task. Compounding matters is the fact

Identity Theft

Machine Identity Failings Expose Firms

Nearly all IT decision makers believe that protecting machine identities is as important or more important that human identity management, but most struggle to deliver that protection, according to a

Hardware/Network

Much More Than Just Security – The Future Of Identity And Access Management

As more organisations embark on the journey that is digital transformation, the ability to manage the digital identities is becoming more crucial — especially at a time when the Internet

Hardware/Network

Five key security tips to avoid an IoT hack

Recently, Russian PIR Bank lost $1,000,000 because of a compromised router that allowed hackers to gain entry into their local network. Why did it happen and how companies can protect themselves?  Malicious

Hardware/Network

The Two-Step Process to Fix the Internet’s Identity Problem

In today’s digital world there are nearly 23.14 billion connected devices. Employees across the globe are using these devices to do everything from check personal and corporate emails to access corporate

Identity Theft

Identity Assurance By Our Own Volition And Memory

In an earlier article we briefly referred to Expanded Password System (EPS) that accepts both images and texts as the shared secrets. The proposition of EPS is now acknowledged as a ‘Draft Proposal’

Industry Insights

Healthcare Organizations Must Strengthen Their Cybersecurity Immunity To Avoid Falling Victim To Cybercriminals

Cybercriminals looking to make a profit are turning their attention towards an industry known for housing sensitive consumer data with weak security protocols: healthcare. In April of 2018, Utah-based company HealthEquity reported