6 Steps to Modernize Your On-Premises Identity and Access Management Architecture

With IT staff struggling to keep up with help desk tickets and users drowning in a sea of passwords, organizations are looking to centralize identity and access management (IAM) in the cloud.

The post 6 Steps to Modernize Your On-Premises Identity and Access Management Architecture appeared first on Security Intelligence.

Continue reading 6 Steps to Modernize Your On-Premises Identity and Access Management Architecture

The IT Trifecta: An Overview of National Cyber Security Awareness Month 2019

This year, National Cyber Security Awareness Month focuses on a trifecta of themes: Own IT, Secure IT and Protect IT.

The post The IT Trifecta: An Overview of National Cyber Security Awareness Month 2019 appeared first on Security Intelligence.

Continue reading The IT Trifecta: An Overview of National Cyber Security Awareness Month 2019

Sound Advice: Our 2019 International Podcast Day Roundup

Sept. 30 is International Podcast Day. Here’s a roundup of this year’s most interesting and insightful SecurityIntelligence podcasts.

The post Sound Advice: Our 2019 International Podcast Day Roundup appeared first on Security Intelligence.

Continue reading Sound Advice: Our 2019 International Podcast Day Roundup

Can Authentication Negatively Impact the User Experience?

To improve the user experience without compromising security, organizations should evolve their risk-based authentication (RBA) strategy to one of trust-based authentication.

The post Can Authentication Negatively Impact the User Experience? appeared first on Security Intelligence.

Continue reading Can Authentication Negatively Impact the User Experience?

iOS 13 at Work, Part 1: Enabling Single Sign-On (SSO) and Distributing Custom Apps

With iOS 13, organizations can more easily distribute corporate applications to users and can integrate new single sign-on capabilities.

The post iOS 13 at Work, Part 1: Enabling Single Sign-On (SSO) and Distributing Custom Apps appeared first on Security Intelligence.

Continue reading iOS 13 at Work, Part 1: Enabling Single Sign-On (SSO) and Distributing Custom Apps

How to Take Control of Your Privileged Accounts

Privileged access management is a top concern for CISOs. Learn how to discover your organization’s privileged accounts, why you need a least privilege strategy and how to reduce risky applications.

The post How to Take Control of Your Privileged Accounts appeared first on Security Intelligence.

Continue reading How to Take Control of Your Privileged Accounts

How to Select the Right IDaaS Vendor and Avoid Deployment Pain Points

Reading Time: 4 minutes Companies of all sizes are turning to IDaaS vendors to help them protect systems, applications, identities and data wherever they reside — whether in the cloud, on-premises or on mobile devices.

The post How to Select the Right IDaaS Vendor and Avoid Deployment Pain Points appeared first on Security Intelligence.

Continue reading How to Select the Right IDaaS Vendor and Avoid Deployment Pain Points

Blockchain Transactions, RFID and More: 7 Security Tips to Help Regulate the Cadaver Trade

Reading Time: 4 minutes Today, the body broker business is unregulated as in centuries past. Security tools such as RFID tracking, blockchain transactions and IAM can help validate the trustworthiness of buyers and sellers.

The post Blockchain Transactions, RFID and More: 7 Security Tips to Help Regulate the Cadaver Trade appeared first on Security Intelligence.

Continue reading Blockchain Transactions, RFID and More: 7 Security Tips to Help Regulate the Cadaver Trade