11.2.2017 - Initiating Steps On The Path To GDPR Compliance

If you are reading this you have heard of the General Data Protection Regulation (GDPR) and are concerned whether it applies to you. Since it applies to all European Union citizens, no matter where they are located in the world, it is very likely that it does. The question of enforceability, especially if you don’t have an EU presence, is a different issue. But most multi-national companies are following the requirements down to their supply chain, so if you are not compliant, you may find business opportunities drying up. ...

10.9.2017 - Four Simple Steps to Online Safety

Cybercrime is a serious issue in today’s society — so much so that the Department of Homeland Security has made October National Cyber Security Awareness Month. The recent Equifax hack shows that no business, no matter how large, is immune to cyberattacks. You can never be certain your information is totally safe. ...

09.11.2017 - Buyer’s Guide to Multi-Factor Authentication (MFA)

MFA is the norm in business today due to the desire for better access control and the need to comply with regulatory requirements. And while every company and every vertical have different requirements for their MFA solutions, they all should start by analyzing the same three elements: scope, usability, and means of delivery. With these elements in mind, this paper takes a tactical approach to guide you through various MFA options. ...

09.4.2017 - Cybersecurity Threats Your Employees Should Know About

Cybersecurity is a bigger concern than ever before, both for corporations and individuals. Hackers have a wide variety of tools at their disposal to help them access private data that belongs to your company or clients. It’s important to be aware of the major areas of susceptibility in order to safeguard the vital information that exists in your company’s network and it’s important to make sure your employees are aware as well. Here are breach points you and your employees should watch out for: ...

08.11.2017 - Why Identity and Access Management Is So Important for Data Security

With advances in modern technology, stealing passwords and hacking into networks is easier than ever. A hacker can crack a four letter, two-digit password in less than a second. More importantly, if your data is not on a completely private server, a breach anywhere on the server could compromise everyone’s data. ...

07.10.2017 - Cloud Provisioning – The Good, Bad, and the Ugly

When we talk about provisioning cloud services, there is Just In Time (JIT) provisioning and bulk provisioning. JIT provisioning is where accounts are created as a side effect from federation. In other words, the first time a user federates to a service, his account is created using the federation token and information queried from the user. Bulk provisioning is where the accounts are created in bulk ahead of time and actively maintained independently from federation. The main problems with JIT provisioning are ...

05.31.2017 - Using IAM Tools To Cut The Costs of a Data Breach

What is the cost of a data breach? In the case of Yahoo! CEO Marissa Meyer, who accepted the consequences of the 2013/2014 Yahoo data breach in 2016, the answer was at least $2 million, the amount of the annual bonus she lost because of the breach. She also gave up her annual equity grant for 2017, which could have been worth millions more. However, it probably cost Yahoo!, its partners and its users a lot more than that. What happened and what could have been done to prevent these types of breaches? ...

Page 1 of 512345