Beware of Shady Websites Pushing Pharmaceuticals for COVID-19

Researchers have uncovered several shadowy sellers eager to capitalize on the quest for a treatment for COVID-19. Scared shoppers should be aware that these websites are only trying to get their attention to defraud them. Researchers from NormShield lo… Continue reading Beware of Shady Websites Pushing Pharmaceuticals for COVID-19

UK Cyber Body Offers Practical Guidelines on Dealing with Coronavirus-Themed Cyber Threats

The National Cyber Security Centre, the UK’s independent authority on cybersecurity, has released practical advice for individuals and organizations on how to deal with coronavirus-related malicious cyber activity. In a joint announcement with th… Continue reading UK Cyber Body Offers Practical Guidelines on Dealing with Coronavirus-Themed Cyber Threats

Social Distancing: The hidden risks of online exposure

Whether you’ve bunked up with your family or you’re self-isolating, you are among the crowds engaged in a struggle of social distancing, which is quickly becoming the norm in 2020. While staying at home may limit the spread of the disease a… Continue reading Social Distancing: The hidden risks of online exposure

How CIAM Addresses the Challenges of Consumer Identity Management

A consumer identity and access management (CIAM) solution can help enable secure, personalized, omnichannel interactions between consumers and brands.

The post How CIAM Addresses the Challenges of Consumer Identity Management appeared first on Security Intelligence.

Continue reading How CIAM Addresses the Challenges of Consumer Identity Management

A Proposed New Trust Framework for Physical and Digital Identity Interactions

As we broaden our scope of identity and consider what is required to exchange trusted personal data across physical and digital realms, community interoperability becomes even more important.

The post A Proposed New Trust Framework for Physical and Digital Identity Interactions appeared first on Security Intelligence.

Continue reading A Proposed New Trust Framework for Physical and Digital Identity Interactions

Workforce Versus Consumer IAM: Key Differences and Use Cases

While workforce IAM focuses on a high degree of security, consumer IAM must balance user experience and security at all times.

The post Workforce Versus Consumer IAM: Key Differences and Use Cases appeared first on Security Intelligence.

Continue reading Workforce Versus Consumer IAM: Key Differences and Use Cases

Hey CMOs, Your Security Team Is Your Secret Weapon

There is an untapped ally in your business that can help you not only reduce customer churn, but also improve your brand image and delight your customers: your security team.

The post Hey CMOs, Your Security Team Is Your Secret Weapon appeared first on Security Intelligence.

Continue reading Hey CMOs, Your Security Team Is Your Secret Weapon

3 Ways to Supercharge Identity and Access Management

Adaptive access, identity analytics and decentralized identity strategies can all help organizations modernize their identity and access management programs.

The post 3 Ways to Supercharge Identity and Access Management appeared first on Security Intelligence.

Continue reading 3 Ways to Supercharge Identity and Access Management

5 Ways to Enhance Customer Experience in E-commerce

E-commerce sales are projected to climb to 10% of all retail revenue for the first time by the end of 2018, with consumers expected to spend a staggering $124.1 billion over the internet during the holiday season. With so much at stake, businesses need… Continue reading 5 Ways to Enhance Customer Experience in E-commerce

Will the Future of Authentication Run Into a Privacy Wall?

Digital identify, technological innovation, authentication and data privacy issues are not aligned. This impacts how we handle relationships and business. Policy issues must be resolved.

The post Will the Future of Authentication Run Into a Privacy Wall? appeared first on Security Intelligence.

Continue reading Will the Future of Authentication Run Into a Privacy Wall?