Venable's Grant Schneider and Jeremy Grant and ISMG editors discuss progress at the U.S. federal level in developing legislation for digital identity, the significance of an 18% increase in funding for CISA in fiscal year 2023 and the challenges of expanding the use of software bills of materials.
The identity verification challenge for enterprises has become significantly more complicated due to mass digital transformation.
But behavioral analytics and anomaly detection, working together, can reduce both fraud and the friction that can come with traditional authentication methods.
Download this eBook in...
CyberArk has pushed beyond privileged access management to address broader identity use cases as the rise of machine identities creates new challenges. The company will offer more holistic protection to user and nonuser identities by expanding into secrets management and cloud privilege security.
The access landscape has changed. The traditional perimeters are dissolving, and as organizations move to a decentralized workforce and network architecture (including servers, data centers, access points, and more), what was previously safe behind a network wall is no longer protected.
Download this whitepaper to...
Access points are a major cybersecurity risk for an organization. From third-party attacks to ransomware to the theft of private information, hackers are finding new ways to infiltrate organizations, and traditional methods of stopping them are failing.
Learn how and why your access points are at risk and what...
Ransomware is everywhere. It’s a topic consistently making headlines with new breaches reported weekly, and it’s showing no signs of slowing down. There were 700 million attempted ransomware attacks in 2021 (up 134% from 2020). It’s truly not a matter of “if” but “when” you will experience a breach....
Token selected former OneSpan CRO John Gunn as CEO to scale the organization and prepare its wearable authentication ring for large-scale production. Gunn is tasked with sourcing the critical components needed to manufacture the ring and building a base of paying clients for the biometric tool.
Markus Kalka, head of security authentication services at Takeda, talks about the challenges of changing identity service providers and shares the experience of consolidating three services into one at his company, a Japanese multinational pharmaceutical.
How does a conglomerate implement PAM across multiple companies? What are some of the challenges, and how can you overcome them? Gonz Gonzales, the CISO at JG Summit Holdings, one of the largest conglomerates in the Philippines, shares his journey of PAM implementation across companies.
Tired of keeping track of passwords? Recent announcements by major platform vendors Google, Apple and Microsoft could have passwords down for the count in the next six years, says Andrew Shikiar, executive director of the FIDO Alliance, which has been on a 10-year mission to eliminate passwords.
Aura has laid off 70 employees as a result of customer acquisition strategy changes just a year after raising $350 million. The layoffs came about as a result of an agreement inked with MetLife earlier this year that made it Aura's exclusive go-to-market partner for the employee benefits channel.
Ping Identity is making a $50 million bet it can integrate cutting-edge technology into its own stack through a new in-house corporate venture fund to support identity and access management technology startups. "We want to have a nice overall corporate strategy portfolio," says Ping's Anton Papp.
The need for more modern identity and access management capabilities such as biometric and passwordless authentication has been amplified by the COVID-19 pandemic and the shift to remote work, according to Forrester researchers Paul McKay and Merritt Maxim.
Evolving to a zero trust architecture can be overwhelming for organizations, leaving many unsure of where they should even start. Cloudflare Chief Security Officer Joe Sullivan urges CISOs to break the journey into bite-sized chunks that can be easily digested.
Interest in passwordless authentication architecture continues to grow among U.S. government agencies and departments as they embrace more modern approaches to identity and access management, says Sean Frazier, federal chief security officer at Okta.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing paymentsecurity.io, you agree to our use of cookies.