Design Your IAM Program With Your Users in Mind

To gain the buy-in you need to make your IAM program successful, it’s important to consider your employees’ goals and needs during the design process.

The post Design Your IAM Program With Your Users in Mind appeared first on Security Intelligence.

Continue reading Design Your IAM Program With Your Users in Mind

How ‘Mini CEO’ Laurene Hummer Engineers Better Identity and Access Management

Laurene Hummer used to answer society’s big energy questions. Now she’s helping you access your applications more easily as the “mini CEO” of IBM Security’s identity and access management offering.

The post How ‘Mini CEO’ Laurene Hummer Engineers Better Identity and Access Management appeared first on Security Intelligence.

Continue reading How ‘Mini CEO’ Laurene Hummer Engineers Better Identity and Access Management

Cloud Identity Security for MSPs

One of the most critical objectives for an MSP is to simply help keep their clients safe. From 2013 to 2017, 85% of the cyber insurance claims were filed from smaller organizations. Furthermore, it’s been recently shown that around 60% of SMBs go… Continue reading Cloud Identity Security for MSPs

AI May Soon Defeat Biometric Security, Even Facial Recognition Software

Threat actors will soon gain access to artificial intelligence (AI) tools that will enable them to defeat multiple kinds of authentication systems, even biometric security.

The post AI May Soon Defeat Biometric Security, Even Facial Recognition Software appeared first on Security Intelligence.

Continue reading AI May Soon Defeat Biometric Security, Even Facial Recognition Software

Intelligent Access Certification Improves Decision-Making Around Compliance, Identity Governance and More

Intelligent access certification helps security teams improve visibility into access, prioritize compliance tasks with risk-based insights and make better decisions with actionable intelligence.

The post Intelligent Access Certification Improves Decision-Making Around Compliance, Identity Governance and More appeared first on Security Intelligence.

Continue reading Intelligent Access Certification Improves Decision-Making Around Compliance, Identity Governance and More

Overview of Cloud Identity Management

With IT organizations shifting more of their core infrastructure to the cloud, many IT admins are looking for an overview of cloud identity management. Like any fairly new IT concept, there are a wide range of interpretations to cloud identity manageme… Continue reading Overview of Cloud Identity Management

How Former Bomb Disposal Expert and Lighting Designer Shaked Vax Pivoted Toward a Cybersecurity Career

Shaked Vax dismantles bombs and created light shows for rock stars before starting his cybersecurity career. Now he’s leading IBM Trusteer’s move into frictionless identity management.

The post How Former Bomb Disposal Expert and Lighting Designer Shaked Vax Pivoted Toward a Cybersecurity Career appeared first on Security Intelligence.

Continue reading How Former Bomb Disposal Expert and Lighting Designer Shaked Vax Pivoted Toward a Cybersecurity Career

Multifactor Authentication Delivers the Convenience and Security Online Shoppers Demand

When framed as an innovative, even “cool” feature, multifactor authentication can deliver the security online retail customers demand without diminishing the user experience.

The post Multifactor Authentication Delivers the Convenience and Security Online Shoppers Demand appeared first on Security Intelligence.

Continue reading Multifactor Authentication Delivers the Convenience and Security Online Shoppers Demand