Usable Identification – The Key to a World Without Passwords


RSA Conference 2014 Redux

ianyip

By: ianyip
March 19, 2014 8:33 am

Reads: (233)

If you follow me on Twitter, you probably noticed a heightened volume of Tweets from me during the RSA Conference in San Francisco. It was great catching up with many of you based stateside that I rarely get to see in person. I was also fortunate enough to be allowed to attend sessions and live-Tweeted …

+read more

Tags: , , , , , , , , , , , , , , , ,
Categories: Identity & Access Management, Security Management

Australia’s new Privacy Principles – Things to Consider

ianyip

By: ianyip
March 18, 2014 10:37 am

Reads: (162)

Effective 12th March 2014, Australia’s Information Privacy Principles and National Privacy Principles was replaced by 13 Australian Privacy Principles (APPs). Here are the important points to note: Applies to all organisations that turn over more than $3 million per year and collect personal data. Fines up to $1.7 million for breaches. Organisations must be transparent …

+read more

Tags: , , , , , , , , , , , , ,
Categories: Security Management

Identity-Powered Security: A new approach to stopping targeted attacks

Renee Bradshaw

By: Renee Bradshaw
February 24, 2014 8:59 am

Reads: (267)

It’s a fact that today’s emerging IT delivery models, such as Cloud, Mobile, BYOD, and Social, are driving immense complexity in your IT infrastructure.  At the same time, you are faced with increasing diversity in the types of threats you face daily.  A quick scan of the headlines reveals that insider attacks remain unchecked, accidental …

+read more

Tags: , , , , , , , , , , , , , , ,
Categories: Access Manager, Change Guardian, Cloud Access, Directory and Resource Administrator, Identity & Access Management, Identity Manager, Privileged User Manager, Secure Configuration Manager, Security Management, Sentinel

Developing Your Strategy Against Targeted Attacks – A Technical Series

lhilal

By: lhilal
February 12, 2014 2:03 pm

Reads: (577)

Targeted attacks, often referred to as Advanced Persistent Threats (APTs), are notoriously difficult to explain and define. And the containment of targeted attacks is even more daunting given the fact that a single product cannot do it. Almost everyone universally believes that targeted attacks do not have a technical solution. Targeted attacks are not new; …

+read more

Tags: , , , , , , , , , , ,
Categories: Change Guardian, Secure Configuration Manager, Security Management, Sentinel

Using Identity to Stop the Inside Attack

Renee Bradshaw

By: Renee Bradshaw
February 6, 2014 1:56 pm

Reads: (558)

Despite steady investments in security, ever larger data breaches continue to dominate the news. Increasing IT complexity, driven in part by cloud, mobility, and social identity, continue to make the job of security teams even harder. A recent survey of 763 IT security decision makers and practitioners across North America and Europe conducted by CyberEdge …

+read more

Tags: , , , , , , , , , , , , , , , , , ,
Categories: Change Guardian, Directory and Resource Administrator, Identity & Access Management, Identity Manager, Privileged User Manager, Secure Configuration Manager, Security Management, Sentinel

It’s Time to Get Serious about HIPAA

kpurdy

By: kpurdy
January 22, 2014 8:44 am

Reads: (11889)

The signs are all there.  It’s time to get serious about complying with the Health Insurance Portability and Accountability Act (HIPAA) Security and Privacy Rules.  Are you compliant yet?  If not, the U.S. Department of Health Human Services (HHS) wants you to know that tolerance for noncompliance with HIPAA regulations is lower than ever before.  …

+read more

Tags: , , , , , , , , , , , , , , , , , , ,
Categories: Secure Configuration Manager, Security Management

What Are Cloud Identity and Access Management Services?

David Shephard

By: David Shephard
January 21, 2014 9:53 am

Reads: (521)

The management of identity and access in a cloud environment are among the more challenging problems for the enterprise of today. As cloud-based services become more prevalent within the enterprise as a necessary precursor to more mobile, more accessible organizational structures, ensuring that an individual is who they say they are becomes more important. So …

+read more

Tags: , , , ,
Categories: Cloud Access