The State of The Ransomware Problem
https://www.technology.org/2019/07/23/the-state-of-the-ransomware-problem/ ...
Authentication 101: Your Basic Guide to Authentication
5 Big Data Vulnerabilities You Could Be Overlooking
Optimal discusses the importance of IAM and how only the right people should have access to data, and there must be controls in place to both prevent and allow access when necessary. ...
Zero Trust: Organizations can begin to trust users, devices and transactions starting with a high level of IAM services and support.
A Zero Trust model begins with strong identity and access management (IAM) solutions. The challenge is how to balance between absolute assurance (thereby promoting maximum security) and end-user productivity and usability. The user identity can be challenged in many ways – for example, by requiring a hardware token or asking the person to answer a series of security questions – but overtly challenging the user can cause frustration and lead to lost productivity. ...
The Best Tools & Techniques for Employee Security Awareness Training
Does My Business Need Cloud Security?
Mergers, Acquisitions and Divestitures – How to Unite Your Active Directories
CIOs that are under pressure to bring two companies’ IT systems and applications together after a merger or acquisition can unify their directory services quickly and inexpensively with a Virtual Identity Server. This paper looks at three of the leading approaches to bridging disparate sets of directory services into one seamless directory following a merger or acquisition. Conversely, we’ll look at the aspect of a divestiture, in which one company must entirely split out from another. Here, too, directory services play a role in a clean and quick divestiture or spin-off. ...
European Identity & Cloud Conference Ticket Giveaway
Optimal IdM is giving away tickets to the conference! Win one of three free tickets to the entire conference and workshop sessions. Participation is free of charge and the closing date for entries is April 19, 2019. Winners will be notified by e-mail and/or by phone. Ticket value is €2500.00 Location: Munich, Germany Date: May 14-17, 2019 Fill out the form with your name, company, e-mail and phone for your chance to win. Or get additional information on the event before submitting. ...
Typing Biometrics and Other Multi-Factor Authentication Methods: When Passwords Are Not Enough
81% of data breaches are from weak, default or stolen passwords. Leveraging MFA when it’s offered lessens the attack vector for digital identity impersonation attempts. This paper looks at existing MFA options, including biometric typing technology, examines decision factors for MFA and discusses the difference between various authentication methodologies. ...
Hotel Show-and-Tell – Massive Data Breach Exposes Identities
If you were one of the 500 million users affected by the December 2018 Marriott/Starwoods password breach, your credentials were exposed, your personal details were collected as was, possibly, your credit card information on file. ...

