Fixing Identity and Access Management – Paul’s Security Weekly #604

Federico Simonetti is the CTO of Xiid Corporation. Federico comes on the show to discuss How To Fix Identity & Access Management. Full Show Notes Follow us on Twitter: https://www.twitter.com/securityweekly Hosts
The post Fixing Identity and Access… Continue reading Fixing Identity and Access Management – Paul’s Security Weekly #604

Thales Wins Cybersecurity Excellence Awards for Encryption and Identity and Access Management Solutions

Thales’ SafeNet Data Protection on Demand and SafeNet Trusted Access solutions have won the gold award in the Encryption and Identity and Access Management categories of the 2019 Cybersecurity Excellence Awards.
The post Thales Wins Cybersecurity… Continue reading Thales Wins Cybersecurity Excellence Awards for Encryption and Identity and Access Management Solutions

Tips for Choosing the Best IAM Solution

Information is power, so only the right people must have access to it. Identity and access management (IAM) is one of the key tools you can use for ensuring corporate cybersecurity. There are many security providers on the market, but how do you know … Continue reading Tips for Choosing the Best IAM Solution

Why Identity Security Matters

Many executives and business owners haven’t really spent much time thinking about identity security within their organizations. It makes sense because they have so many other, more pressing matters to think about, like growing their business. But… Continue reading Why Identity Security Matters

The Top 5 Vendor-Neutral Cloud Security Certifications of 2019

Many organizations migrate to the cloud because of increased efficiency, data space, scalability, speed and other benefits. But cloud computing comes with its own security threats. To address these challenges, companies should create a hybrid cloud env… Continue reading The Top 5 Vendor-Neutral Cloud Security Certifications of 2019

Serverless Cloud Identity and Access Management

The IT management space is an a constant state of flux. Tools that used to be delivered as on-prem solutions are now moving to the cloud. A key contributor to this change is the cloudward shift in the overall IT environment.  Because the cloud has… Continue reading Serverless Cloud Identity and Access Management

Santa?s Little Helpers? The Surge of Seasonal Workers Brings Additional Risk

Learn how to quickly onboard temporary holiday staff without over entitled access and avoid abandoned accounts upon their departure.
The post Santa?s Little Helpers? The Surge of Seasonal Workers Brings Additional Risk appeared first on Security Boulev… Continue reading Santa?s Little Helpers? The Surge of Seasonal Workers Brings Additional Risk

Entering the Twilight Zone: Adventures in the Security Leader Search

If you’re in your 40s or 50s, you probably remember a TV series called The Twilight Zone. (Millennials, think Netflix’s Black Mirror). Every show was its own stand-alone story that took viewers into an alternate reality where things got wei… Continue reading Entering the Twilight Zone: Adventures in the Security Leader Search