We began last January with the realization that we have met a new and far more difficult class of cyber threat with the SolarWinds attack followed by the Colonial Pipeline attack in May. Both point to a fully wired world where physical and digital are colliding at unprecedented speeds.
If we had to choose a theme...
The road to Zero Trust starts with an entry point on the road map. But what are the common entry points, and how might the journey unfold? Satish Gannu, CTO-Digital of Korn Ferry, discusses the Zero Trust road map with Paul Martini, CEO of iboss.
Identity: In most instances it can be an asset. But occasionally, left improperly secured, it can be a roadblock for an enterprise. Wade Ellery of Radiant Logic explains the Identity Data Fabric and how it can help enterprises solve major business problems.
The U.S. Federal Trade Commission reports that impostor scams were the #1 type of fraud reported by consumers last year, with losses to American consumers nearly $30B. UK Finance reported an increase in authorized push payment fraud last year with loss of more than £479M, and top UK bank Barclays reported a 20%...
The time for Machine Identity Management is NOW. Hear from 1,000 security and public key infrastructure (PKI) professionals on how automation and SaaS redefine Next-Gen Machine Identity Management.
Download the 2021 report now.
Traditional hub-and-spoke networking architectures,
along with the castle-and-moat security perimeter
they utilize, simply cannot effectively provide
performance or security in today’s cloud-and-mobile
world. This is a problem all companies must begin
facing, lest they be left behind in a vulnerable...
If you picked a website at random, what you’d find might
surprise you. You would probably discover that, according to
Akamai internal research, automated web robots, or bots, are
responsible for between 30% and 70% of the total traffic to
websites today. That simple statistic belies a complicated truth.
Learn how the latest advances in privileged user monitoring can close windows of opportunity for attackers and keep business-critical data safe from credential theft, lateral attack movement, ransomware, and other threats.
The challenge of dealing with cybercrime is complex. Human factors and the human-computer interface are central components of cybersecurity. But because threat actors understand human behavior, they know how to manipulate it to achieve their goals—stealing money and valuable information from organizations...
This Aite-Novarica Group white paper, commissioned by Radiant Logic, examines the
toll enterprises pay due to identity sprawl and introduces Radiant Logic’s Identity Data
Fabric approach to support identity unification and simplification.
Key takeaways from this research include:
Financial services companies...
From the IT perspective, it’s harder than ever to manage the unending requests from the business side. Moving to the cloud, adding new applications, integrating new partners, securing new devices—business needs keep piling up, and it all needs to be done yesterday. Before you know it, IT has become the bottleneck...
When a large oil company moved to the US from Canada, they also embarked on an IAM modernization
and integration project. Because their business model included future M&As, the goal was to create a
foundation to support integration of business entities with disparate identity infrastructures so that they