Why 2020 Will Be the Year Artificial Intelligence Stops Being Optional for Security

Artificial intelligence is being built into security tools and services of all kinds, so it’s time to change our thinking around AI’s role in enterprise security.

The post Why 2020 Will Be the Year Artificial Intelligence Stops Being Optional for Security appeared first on Security Intelligence.

Continue reading Why 2020 Will Be the Year Artificial Intelligence Stops Being Optional for Security

3 Ways to Supercharge Identity and Access Management

Adaptive access, identity analytics and decentralized identity strategies can all help organizations modernize their identity and access management programs.

The post 3 Ways to Supercharge Identity and Access Management appeared first on Security Intelligence.

Continue reading 3 Ways to Supercharge Identity and Access Management

The Principle of Least Privilege Makes Total Sense, But How Do You Put It to Work?

The principle of least privilege can create balance between security, risk and productivity. The benefits are clear, but how can you adopt this approach to identity and access management?

The post The Principle of Least Privilege Makes Total Sense, But How Do You Put It to Work? appeared first on Security Intelligence.

Continue reading The Principle of Least Privilege Makes Total Sense, But How Do You Put It to Work?

How Authentication and Identification Work Together to Build Digital Trust

Building trust in an online or mobile user requires both identification and authentication.

The post How Authentication and Identification Work Together to Build Digital Trust appeared first on Security Intelligence.

Continue reading How Authentication and Identification Work Together to Build Digital Trust

Sound Advice: Our 2019 International Podcast Day Roundup

Sept. 30 is International Podcast Day. Here’s a roundup of this year’s most interesting and insightful SecurityIntelligence podcasts.

The post Sound Advice: Our 2019 International Podcast Day Roundup appeared first on Security Intelligence.

Continue reading Sound Advice: Our 2019 International Podcast Day Roundup

Can Authentication Negatively Impact the User Experience?

To improve the user experience without compromising security, organizations should evolve their risk-based authentication (RBA) strategy to one of trust-based authentication.

The post Can Authentication Negatively Impact the User Experience? appeared first on Security Intelligence.

Continue reading Can Authentication Negatively Impact the User Experience?

Blockchain Transactions, RFID and More: 7 Security Tips to Help Regulate the Cadaver Trade

Reading Time: 4 minutes Today, the body broker business is unregulated as in centuries past. Security tools such as RFID tracking, blockchain transactions and IAM can help validate the trustworthiness of buyers and sellers.

The post Blockchain Transactions, RFID and More: 7 Security Tips to Help Regulate the Cadaver Trade appeared first on Security Intelligence.

Continue reading Blockchain Transactions, RFID and More: 7 Security Tips to Help Regulate the Cadaver Trade

Digital Identity Trust Life Cycle: Implementing Your Fraud Protection Solution

Reading Time: 3 minutes Going live with your fraud protection solution should be a strategic process that enables smooth transitions and positive outcomes.

The post Digital Identity Trust Life Cycle: Implementing Your Fraud Protection Solution appeared first on Security Intelligence.

Continue reading Digital Identity Trust Life Cycle: Implementing Your Fraud Protection Solution

The Digital Identity Trust Life Cycle: Onboarding and Deploying a Fraud Protection Vendor

Digital trust expert Rob Rendell explains what components are important for a smooth kickoff and how to prepare both your team and your new fraud protection vendor’s team.

The post The Digital Identity Trust Life Cycle: Onboarding and Deploying a Fraud Protection Vendor appeared first on Security Intelligence.

Continue reading The Digital Identity Trust Life Cycle: Onboarding and Deploying a Fraud Protection Vendor

Enhance Customer Data Privacy and Digital Trust by Avoiding Dark Patterns

Some apps and sites are finding ways to subvert their user interfaces in ways that intentionally manipulate users. These methods are collectively known as dark patterns.

The post Enhance Customer Data Privacy and Digital Trust by Avoiding Dark Patterns appeared first on Security Intelligence.

Continue reading Enhance Customer Data Privacy and Digital Trust by Avoiding Dark Patterns