Cybersecurity and threat news for Europe, the Middle East & Africa
These search results are from across the Techday Network of sites
Organisations still can’t get access management right - One Identity
These and other findings paint a bleak picture of how many organisations approach IAM and PAM programs.
Making biometric technology more secure – One Identity
There are distinct security advantages to using something that’s a unique part of the user, rather than something they must recall from memory.
Exclusive: Measurement key to successful identity governance implementation
Access management is about providing a frictionless operating environment to lead business growth while reducing a business’s exposure to risk.
Interview: Unravelling the myths of chatbot security and identity theft in banking
“People shouldn’t be worried about internet banking. They should be worried about what information they’re giving people who can impersonate them.
Guardians of data: Who watches over our information
Controlling who has access to certain information is a necessity in today’s business world.
Widespread mismanagement of privileged accounts and access revealed in global survey
These findings are significant considering that privileged accounts grant access to nearly every component of a company’s IT infrastructure.
Singapore, Aus employees admit to snooping around corporate networks
Employees in Singapore, Australia and across the globe snoop their employer’s networks to seek information they are not permitted to access.
Dormant employee accounts a major cyber risk for Singapore businesses
Only seven percent of respondents in Singapore say they remove access for users immediately upon a change in HR status.
Diving into the magic of two-factor authentication
More effective privileged account management can also greatly mitigate risk and reduce the exposure surface for businesses.
Mitigating identity-related risks: The complete package or a one-man show?
Think of behaviour analytics as Iron Man and identity analytics as The Avengers and you have a powerful approach to identity access management.
Interview: The dark side of biometrics - why social engineering could destroy security
In depth with One Identity: "Anyone who has let a stranger hold an unlocked phone is putting themselves at risk of being breached."
One Identity closes the circle with new partner program
IAM vendor One Identity has launched a new multi-tier partner program which it says increases the available financial incentives by four times.
Whitepaper: Why it’s critical to detect cyber attacks as they happen
"Many organisations are struggling to keep pace with the speed in which hackers are attacking their systems."
Whitepaper: The key to compliance is governing access to data
By implementing a governance-based approach to identity governance, companies can secure their organisation’s sensitive data.
Whitepaper: How to explain why IT security needs more budget
Do you want to convince your higher-ups that IT and security need more budget?
What does sustainable compliance look like?
Getting an organisation compliant is one thing, keeping it that way is another.
Survey: App dev is surging, but how are businesses doing it?
Today “every company is in the software business" to get a competitive edge, and this survey reveals how app dev is affecting IT teams.