How to Implement Cloud Identity and Access Governance

Creating identity and access governance across cloud environments is crucial for modern organizations. In our previous post, we discussed how important human and non-human identities are for these environments and why their management and the governance of their access can be difficult. In the face of these challenges, our cloud identity and access governance (CIAG) […]

The post How to Implement Cloud Identity and Access Governance appeared first on Security Intelligence.

Continue reading How to Implement Cloud Identity and Access Governance

How to Create Identity and Access Governance In and Across Clouds

In March 2021, we posted a three-part series about whether cloud-native identity and access management (IAM) controls are good enough for an enterprise. Many of the points we raised at that time are still valid. However, the industry has developed and learned a lot since then. More companies and analysts now recognize cloud identity and […]

The post How to Create Identity and Access Governance In and Across Clouds appeared first on Security Intelligence.

Continue reading How to Create Identity and Access Governance In and Across Clouds

Critical Business Operations Are At Risk, and Companies Are Not Making This a Priority

Many companies around the world with industrial operations environments, commonly referred to as operational technology (OT) environments, do not invest the same resources to protect OT systems as they do to secure their corporate enterprise environments. Yet, these same companies are investing significantly to transform these environments with modern technologies and techniques to improve productivity, […]

The post Critical Business Operations Are At Risk, and Companies Are Not Making This a Priority appeared first on Security Intelligence.

Continue reading Critical Business Operations Are At Risk, and Companies Are Not Making This a Priority

Cloud-Native IAM Controls Part 3: Following Cloud Governance Blueprints

In many cases, one business unit sets up its own cloud-native identity and access management controls differently from another. One of your customers’ business units may need Red Hat, while another may need controls from a specific public cloud provider. The business unit may or may not be using the cloud-native identity and access management […]

The post Cloud-Native IAM Controls Part 3: Following Cloud Governance Blueprints appeared first on Security Intelligence.

Continue reading Cloud-Native IAM Controls Part 3: Following Cloud Governance Blueprints

Facing a Privacy Breach Under Growing GDPR-inspired Laws Can Pose Challenges for Companies

Almost everyone at this point has heard about the European Union’s (EU) General Data Protection Regulation (GDPR). You’ve probably received an email from a company that you have shopped with explaining the recent changes in their privacy policy. Or, you’ve sat through a GDPR training at work, or you’re simply aware that some of the […]

The post Facing a Privacy Breach Under Growing GDPR-inspired Laws Can Pose Challenges for Companies appeared first on Security Intelligence.

Continue reading Facing a Privacy Breach Under Growing GDPR-inspired Laws Can Pose Challenges for Companies

How Authentication and Identification Work Together to Build Digital Trust

Building trust in an online or mobile user requires both identification and authentication.

The post How Authentication and Identification Work Together to Build Digital Trust appeared first on Security Intelligence.

Continue reading How Authentication and Identification Work Together to Build Digital Trust

Can Authentication Negatively Impact the User Experience?

To improve the user experience without compromising security, organizations should evolve their risk-based authentication (RBA) strategy to one of trust-based authentication.

The post Can Authentication Negatively Impact the User Experience? appeared first on Security Intelligence.

Continue reading Can Authentication Negatively Impact the User Experience?

Blockchain Transactions, RFID and More: 7 Security Tips to Help Regulate the Cadaver Trade

Reading Time: 4 minutes Today, the body broker business is unregulated as in centuries past. Security tools such as RFID tracking, blockchain transactions and IAM can help validate the trustworthiness of buyers and sellers.

The post Blockchain Transactions, RFID and More: 7 Security Tips to Help Regulate the Cadaver Trade appeared first on Security Intelligence.

Continue reading Blockchain Transactions, RFID and More: 7 Security Tips to Help Regulate the Cadaver Trade

What Is Conditional Access, and Why Does It Matter to You?

Reading Time: 3 minutes The shift to mobile and cloud has driven the rise of conditional access, which enables IT security teams to validate devices and users with a set of automated policies to protect networks and data.

The post What Is Conditional Access, and Why Does It Matter to You? appeared first on Security Intelligence.

Continue reading What Is Conditional Access, and Why Does It Matter to You?

How to Get Business Users to Buy Into Your Identity and Access Management (IAM) Strategy

Reading Time: 3 minutes Organizations that fail to communicate identity and access management (IAM) processes in relevant business terms often struggle to gain user buy-in.

The post How to Get Business Users to Buy Into Your Identity and Access Management (IAM) Strategy appeared first on Security Intelligence.

Continue reading How to Get Business Users to Buy Into Your Identity and Access Management (IAM) Strategy