Cybersecurity and threat news for Europe, the Middle East & Africa
Identity and Access Management
These search results are from across the Techday network of sites
Averon and tyntec partner to deliver secure wireless authentication
“While myriad authentication solutions have come and gone, user impact and experience have remained stagnant in recent years.”
ForgeRock: Why safeguarding privacy is a competitive advantage
Business leaders who fail to prioritise privacy and security protections do so at the risk of losing customer trust.
One Identity launches authentication services for Unix systems
Unix systems (including Linux and Mac OS), by their very nature, have distinct challenges when it comes to security and administration.
The three new fronts in the fight against fraud
Along with greater speed comes new fronts in the fight against fraud. Here are three trends to watch as financial institutions balance speed and security.
Opinion: Should Huawei be taking shots at its critics?
“ASPI seems to have an unhealthy fixation on our company that has crossed the threshold of independent fact-based thinking to become the “go to” organisation for all things anti-China.”
Why security is critical during cloud migration
At least one-third of Australian businesses now use commercial cloud computing services.
Milestone: How video management software improves access control
Integrated solutions like this are particularly useful in busy industries such as mining, energy and logistics.
NEC develops new O-RAN compliant 5G base station equipment
NEC's RU is supposedly ideal for 5G conditions as they are compact, lightweight and consume a low level of power, which reduces installation and operation costs.
AlgoSec integrates privileged account access security support
“With support for CyberArk, mutual customers can now take a business-centric approach to security policy."
SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Okta: Reclaiming control over digital identity
What is a digital identity? Who is responsible for that information? And what rights do digital citizens have?
Raising the stakes: McAfee’s predictions for cybersecurity
Security teams and solutions will have to contend with synergistic threats, increasingly backed by artificial intelligence to avoid detection.
Exclusive: Ping Identity on security risk mitigation
“Effective security controls are measured and defined by the direct mitigation of inherent and residual risk.”
Gartner: Smartphone biometrics coming to the workplace
Gartner predicts increased adoption of mobile-centric biometric authentication and SaaS-delivered IAM.
Ping Identity CTO’s cybersecurity predictions for 2019
“Our borderless world provides unprecedented freedom and convenience, but also breeds a whole new set of cybersecurity risks and concerns.”
Stronger security needed before open banking arrives - Okta
As early as July 2019, Australian banks will need to have a system in place that both benefits customers and protects their personal data.
Ping Identity doubles down on APAC channel with new hire
The company has made its first regional channel appointment with a new APAC channel and alliance manager.
Akamai acquires Janrain for access management capabilities
Janrain enables enterprises to enhance digital trust by offloading login and registration workloads.
How protecting critical infrastructure starts with securing social media
Erroneous alerts regarding potential missile strikes that caused civil disruption in Hawaii and Japan in recent history.
Exclusive: Three access management learnings from 2018
There was a renewed global response to data security in 2018, placing pressure on organisations to assume more responsibility for the data they hold.
SailPoint releases first identity annual report
SailPoint’s research found that many organisations are lacking maturity in their governance processes over identities.
Proofpoint launches feature to identify most targeted users
“One of the largest security industry misconceptions is that most cyberattacks target top executives and management.”