Protect Your ‘Matrix’ With Strong Privileged Access Management

“The Matrix” shows the damage that a rogue actor can cause by gaining privileged access to a digital environment. Privileged access management tools can help security teams keep their networks secure.

The post Protect Your ‘Matrix’ With Strong Privileged Access Management appeared first on Security Intelligence.

Continue reading Protect Your ‘Matrix’ With Strong Privileged Access Management

Building Resilience Against Evolving Technology: An Interview With a Cyber Risk Expert

According to IBM cyber risk expert Tim Roberts, security professionals must do a better job of communicating with top management as the technology landscape evolves and new threats emerge.

The post Building Resilience Against Evolving Technology: An Interview With a Cyber Risk Expert appeared first on Security Intelligence.

Continue reading Building Resilience Against Evolving Technology: An Interview With a Cyber Risk Expert

Security Specialists Discuss Identity and Access Management in the Age of Ransomware

Security teams should follow identity and access management (IAM) best practices to avoid widespread ransomware attacks such as WannaCry and NotPetya.

The post Security Specialists Discuss Identity and Access Management in the Age of Ransomware appeared first on Security Intelligence.

Continue reading Security Specialists Discuss Identity and Access Management in the Age of Ransomware

And Don’t Be Falling in Love as Security Services Experts Are Walking Away

Security professionals and enthusiasts will have many opportunities to connect with security services experts at IBM InterConnect 2017.

The post And Don’t Be Falling in Love as Security Services Experts Are Walking Away appeared first on Security Intelligence.

Continue reading And Don’t Be Falling in Love as Security Services Experts Are Walking Away

Security Starts With People: Three Steps to Build a Strong Insider Threat Protection Program

To protect their organizations from an insider threat, IT managers should take steps to reduce exposure of data and enhance detection capabilities.

The post Security Starts With People: Three Steps to Build a Strong Insider Threat Protection Program appeared first on Security Intelligence.

Continue reading Security Starts With People: Three Steps to Build a Strong Insider Threat Protection Program

Security Starts With People: Know Who They Are, Know What They Do

Technology is great, but security starts with people. The best way to prevent a data breach is to know the people in your organization and what they do.

The post Security Starts With People: Know Who They Are, Know What They Do appeared first on Security Intelligence.

Continue reading Security Starts With People: Know Who They Are, Know What They Do

Security Starts With People: Know Who They Are, Know What They Do

Technology is great, but security starts with people. The best way to prevent a data breach is to know the people in your organization and what they do.

The post Security Starts With People: Know Who They Are, Know What They Do appeared first on Security Intelligence.

Continue reading Security Starts With People: Know Who They Are, Know What They Do

What’s Wrong With SMS Authentication? Two IBM Experts Weigh In on the NIST Recommendation

IBM experts Dustin Hoff and Ashish Malhotra discussed ways for businesses and end users to mitigate security issues stemming from SMS authentication.

The post What’s Wrong With SMS Authentication? Two IBM Experts Weigh In on the NIST Recommendation appeared first on Security Intelligence.

Continue reading What’s Wrong With SMS Authentication? Two IBM Experts Weigh In on the NIST Recommendation

Get the Identity Governance Scoop: Interview With an Expert

To learn more about identity governance and intelligence, we interviewed Andy Taylor, one of IBM’s identity and access management specialists.

The post Get the Identity Governance Scoop: Interview With an Expert appeared first on Security Intelligence.

Continue reading Get the Identity Governance Scoop: Interview With an Expert

May the Best IAM Program Win: Four Steps to Shoot for the Gold

A mature IAM program optimized to a business’s objectives and the unique circumstances surrounding it can minimize the risk of data breaches.

The post May the Best IAM Program Win: Four Steps to Shoot for the Gold appeared first on Security Intelligence.

Continue reading May the Best IAM Program Win: Four Steps to Shoot for the Gold