PCI Section 8: Multi-factor Authentication and the British Airways Attack

This September, British Airways (BA) was the victim of a major cyber attack. Around 380,000 customers of the largest airline in the UK had their sensitive information compromised. Besides the customers’ names and email addresses, the bad actors b… Continue reading PCI Section 8: Multi-factor Authentication and the British Airways Attack

Identity and Access Management Alternative

In the hotly contested IT management tools marketplace, IT admins are searching for an identity and access management (IAM) alternative. For the last two decades, the core of identity management within an organization has been Microsoft® Active Di… Continue reading Identity and Access Management Alternative

Controlling User Access for HIPAA

Meting out access to IT resources is a directory service’s main goal. This is especially prevalent in regards to HIPAA compliance. Under the HIPAA Security Rule, compliant enterprises are required to have a strong identity and access management (… Continue reading Controlling User Access for HIPAA

Directory-as-a-Service® Overview and Demo Webinar

The cloud directory service is creating a stir in the identity and access management (IAM) space. Many of today’s IT admins are finding that traditional, on-prem approaches to IAM have reached the point of diminishing returns. With legacy solutio… Continue reading Directory-as-a-Service® Overview and Demo Webinar

Hosted Cloud Endpoint Management

The IT world has changed. No longer are companies packed wall to wall with cubicles and Windows® desktops. Today’s workforce is armed with a variety of platforms, systems, and most importantly of all, they’re wireless. With cross-platf… Continue reading Hosted Cloud Endpoint Management

Reconsidering Identity Security: The T Mobile® Breach

A week ago today another massive corporation was the target of a hacking attempt: telecom company, T Mobile®. The company was targeted by a reportedly “international” hacking group. The attack was successful, with almost 2 million T Mo… Continue reading Reconsidering Identity Security: The T Mobile® Breach