Why Your Success Depends on Your IAM Capability

It’s truly universal: if you require your workforce, customers, patients, citizens, constituents, students, teachers… anyone, to register before digitally accessing information or buying goods or services, you are enabling that interaction with identity and access management (IAM). Many IAM vendors talk about how IAM solutions can be an enabler for productivity, about the return on […]

The post Why Your Success Depends on Your IAM Capability appeared first on Security Intelligence.

Continue reading Why Your Success Depends on Your IAM Capability

How to Create Identity and Access Governance In and Across Clouds

In March 2021, we posted a three-part series about whether cloud-native identity and access management (IAM) controls are good enough for an enterprise. Many of the points we raised at that time are still valid. However, the industry has developed and learned a lot since then. More companies and analysts now recognize cloud identity and […]

The post How to Create Identity and Access Governance In and Across Clouds appeared first on Security Intelligence.

Continue reading How to Create Identity and Access Governance In and Across Clouds

Cost of a Data Breach: Retail Costs, Risks and More To Know

E-commerce sales grew by nearly one-third in 2020, in large part due to the pandemic. Meanwhile, retail data breaches grew even more prevalent and costly. Retailers need to know not just the cost of a data breach, but the risks and challenges involved with one. This can help IT security professionals and business owners protect […]

The post Cost of a Data Breach: Retail Costs, Risks and More To Know appeared first on Security Intelligence.

Continue reading Cost of a Data Breach: Retail Costs, Risks and More To Know

What’s Behind the Leaks of Customer Data From Retailer Databases?

Retail data breaches involving customer data happen often today. However, they tend to be smaller insize than health care, finance or government breaches. So, the general public notices them less. Yet, they happen more often than realized. Why? And how can you defend against them?  Human Error in Customer Data Theft All types of retail […]

The post What’s Behind the Leaks of Customer Data From Retailer Databases? appeared first on Security Intelligence.

Continue reading What’s Behind the Leaks of Customer Data From Retailer Databases?

Learning the Building Blocks for Your CIAM Framework Part 3: Manage

Imagine being able to manage hundreds of millions of IDs and process billions of logins and other transactions per day. That’s what you can achieve for your organization by using consumer identity and access management, or CIAM. At the same time, your users can manage their data themselves by having a CIAM system ready to […]

The post Learning the Building Blocks for Your CIAM Framework Part 3: Manage appeared first on Security Intelligence.

Continue reading Learning the Building Blocks for Your CIAM Framework Part 3: Manage

How Good Transaction Security Can Make Customer Visits Easier

Every time I start to put my information into an online form, especially if it’s my credit card number or a banking transaction, I almost always pause. There was a time when I entered customer data without a second thought. Now, with the constant news of breaches and attacks, even those not in the cybersecurity […]

The post How Good Transaction Security Can Make Customer Visits Easier appeared first on Security Intelligence.

Continue reading How Good Transaction Security Can Make Customer Visits Easier

Learning the Building Blocks You Need for Consumer Identity and Access Management Part 2: Engage

Some online experiences are so bad that 25% of users abandon an application after first use and never return. To avoid this retention problem, you should offer better engagement to your customers during their authentication and authorization process. Engage is the second of four building blocks essential for successful consumer identity and access management, or […]

The post Learning the Building Blocks You Need for Consumer Identity and Access Management Part 2: Engage appeared first on Security Intelligence.

Continue reading Learning the Building Blocks You Need for Consumer Identity and Access Management Part 2: Engage

Learning the Building Blocks of Your CIAM Framework Part 1: Capture

Ever been on a website, ready to check out, only to encounter multiple fields to fill at once? Did the process frustrate you and make you close the page without completing your transaction? Such experiences and the resulting loss of customers could be happening to your business. That’s why you need better consumer identity and […]

The post Learning the Building Blocks of Your CIAM Framework Part 1: Capture appeared first on Security Intelligence.

Continue reading Learning the Building Blocks of Your CIAM Framework Part 1: Capture

Don’t reward your loyal customers by treating them like criminals!

Imagine shopping in your favourite wine merchant or checking in to the brand of hotel that you afford the most loyalty, and at the point of self-identification (either to prove age or verification) security is called over and you are frisked. Not a gre… Continue reading Don’t reward your loyal customers by treating them like criminals!

Don’t reward your loyal customers by treating them like criminals!

Imagine shopping in your favourite wine merchant or checking in to the brand of hotel that you afford the most loyalty, and at the point of self-identification (either to prove age or verification) security is called over and you are frisked. Not a great experience. Would you patronise the establishment again? Continue reading Don’t reward your loyal customers by treating them like criminals!