GUEST OPINION: Cybercriminals are constantly on the hunt for new ways to gain access to corporate IT infrastructures. Increasingly, their targets of choice are identity and privilege.
GUEST OPINION: In today’s digital age, business relationships are no longer confined to the bricks-and-mortar office. Organizations depend on a complex, often global, network of vendors, suppliers, and third-party partners. With B2B relationships, sharing sensitive data is necessary for collaboration and efficiency, but this presents its own set of challenges.
Throughout human history, there have been many instances where the number 3 has had a unique significance. In ancient Greece, for example, it was considered the perfect number reflecting harmony, wisdom and understanding. For me, I find that if three or more unrelated people start talking about a specific topic, it takes on a particular relevance. The topic of the moment on every CISO’s lips seems to be unmanaged devices.
GUEST OPINION: Financial services firms around the world are facing a perfect storm of escalating cyber threats, evolving customer demands, and a tightening regulatory landscape. Legacy Identity and Access Management (IAM) systems, often a patchwork of on-premises solutions and point products, are proving inadequate to navigate these challenges. These outdated systems struggle with scalability, lack agility, and create security vulnerabilities.
GUEST OPINION: Organisations should adopt passwordless authentication to withstand the ever-looming threats of cyber attacks, including phishing, keylogging, and man-in-the-middle attacks.
GUEST OPINION: Skilled cybersecurity talent is in tight supply. It's challenging to recruit, hire and retain skilled professionals: trends that are expected to continue into the near future.
GUEST OPINION: Migrating to the cloud is no longer a forward looking trend: it's the industry mainstream, with about 70% of production applications running in the cloud. Clearly, cloud security is becoming synonymous with cybersecurity.
Identity specialist SecureAuth has acquired Acceptto, which provides passwordless authentication as well as behavioural modelling before, during and after authorisation to determine whether a user is a threat.
Ping Identity helps Mortgage Choice deliver "enterprise-grade security to franchisees across Australia" while the company reports a 65% cost reduction with the deployment of the Ping Intelligent Identity Platform.
Identity vendor Ping Identity's PingCentral brings self-service to enterprise identity and access management (IAM).
A top security executive says it is going to take more than proofing to stop ID fraud.
Brisbane-based Identity and Access Management (IAM) solutions provider First Point Global has partnered with global data security company STEALTHbits Technologies to provide extended identity and access governance capabilities to its customers.
Today's ever-increasing threat landscape has resulted in the deployment of disparate identity and access management (IAM) solutions that require an inordinate amount of time, resources and costs to administer. Unlike traditional IAM platforms, Quest Software has taken a completely unified approach with Quest One Identity Solutions, which is now reinforced by the newly acquired BiTKOO granular access technology. As a result, Quest Software is positioned to deliver the most comprehensive IAM solution on the market that lets businesses save time, reduce costs and increase security.
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]