Showing Blog Posts: 1–10 of 43 tagged Identity and Access Management

  • Big Data Is a Big Cybersecurity Problem for Banks

    by Caitlin Moriarity on June 1, 2016

    How many financial service companies are vulnerable to a data breach? Way too many, according to a new report. The report, put together by data security company Vormetric and issued in partnership with analyst firm 451 Research, shows that a whopping 90 percent of the IT security professionals surveyed in the financial services industry believe that their companies are vulnerable to a possible…

  • Perfecting Risk-Based Authentication: Deciphering Multi-Layered Identity Proofing Strategies

    by Gasan Awad on May 12, 2016

    Fraudsters are a smart group. With each fraud prevention method that’s introduced, they figure out ways to work around it. Organizations must be careful when using technologies that fraudsters may have compromised, but that doesn’t mean throwing everything out and starting from scratch. As with many things, in security and fraud prevention one tool is never enough. An alarm system makes your home…

  • Cross-border Is the New Normal

    by Alisdair Faulkner on May 10, 2016

    It's no secret digital consumers increasingly purchase goods and services via cross-border transactions. Digital commerce has essentially created a global economy without borders. In fact, according to Nielsen’s Global Connected Commerce Report, in February 2016, 57 percent of the respondents made a cross-border e-commerce purchase in the past six months. Recognizing this trend, businesses are…

  • World Password Day 2016: How Do You Manage Your Passwords?

    by Jennifer Lawinski on May 5, 2016

    I recently signed up for the TSA Global Entry Pre-Check program, because as I'm going to be traveling for RSA Conference, I'll be spending quality time at JFK for more than just vacations. Why is this information I'm sharing with you on World Password Day 2016? Just two days after I created my account on the government's site, I was notified via email that there was a change in my application…

  • Data Protection and Identity and Access Management Domains

    by RSAC Contributor on July 24, 2015

    This is the second in a three-part series on IT security from Forsythe Technology. This post looks at data protection and identity and access management. Other posts covered core infrastructure and threat and vulnerability management and governance and application security. Your Data Has Left the Building: Are You Protecting It? In the previous post, I talked about the current role of perimeter and…

  • RSA's Amit Yoran Decries Legacy Mindset, Stresses Identity Management, at RSAC APJ 2015

    by Fahmida Y. Rashid on July 22, 2015

    The “old” approach to security never worked, and it was time to abandon that mindset and embrace news ones, Amit Yoran, president of RSA Security, said in his opening keynote for RSA Conference Asia Pacific Japan 2015. “We have sailed off the map” and the current environment is unknown, Yoran said. And the industry can’t keep trying to sail with the old map, the old mindset, in these uncharted…

  • Panel Weighs in on Future of Authentication

    by RSAC Contributor on April 24, 2015

    If you look around during RSA Conference, you will notice there are a number of parallel events going on around Moscone Center. IOActive put together a few talks on Tuesday and Wednesday as part of their IOasis event. In the same vein, Nok Nok Labs hosted a panel discussion on the future of authentication on Thursday. This post comes courtesy of Girish Wadhwani, of Nok Nok Labs. The panel was…

  • RSA's Amit Yoran: Security is Stumbling Around in the Dark

    by Tony Kontzer on April 21, 2015

    Amit Yoran clearly knows a good metaphor when he sees one. Or in this case, doesn’t see one. Yoran, who was named RSA's president last fall, took the stage at the RSA Conference in San Francisco Tuesday to deliver his first opening keynote. In the dark. And he let the audience of thousands sit there, in the pitch black, for an excruciatingly long moment before offering the first glimpses of what…

  • Securosis Guide: Identity and Access Management

    by Securosis Team on April 10, 2015

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. No Respect Identity is one of the more difficult topics to cover in our yearly RSAC Guide, because identity issues and trends don't grab headlines. Identity and Access Management vendors tend to be light-years ahead…

  • The Hacker as an Administrator

    by Marc Maiffret on February 10, 2015

    In many data breaches, your IT team or someone else with the right privileges has been co-opted. By the time an attacker is lifting data from your servers, they are no longer hacking but simply using stolen user credentials and passwords. And in many of those instances, the way they are moving through your environment is not via any custom tools, but by taking advantage of administrative features…

This document was retrieved from on Wed, 26 Oct 2016 07:13:35 -0400.
© 2016 EMC Corporation. All rights reserved.