Biometric Authentication: Finding a Balance Between UX and IT Security

When it comes to authentication, most security professionals see it as a necessary evil. It provides security at the expense of the end user’s desire for a frictionless experience. That way of thinking, however, was challenged at the Opus Research Intelligent Authentication 2016 conference. The two-day event made a point to highlight authentication not only […]

The post Biometric Authentication: Finding a Balance Between UX and IT Security appeared first on Security Intelligence.

Continue reading Biometric Authentication: Finding a Balance Between UX and IT Security

What’s Wrong With SMS Authentication? Two IBM Experts Weigh In on the NIST Recommendation

IBM experts Dustin Hoff and Ashish Malhotra discussed ways for businesses and end users to mitigate security issues stemming from SMS authentication.

The post What’s Wrong With SMS Authentication? Two IBM Experts Weigh In on the NIST Recommendation appeared first on Security Intelligence.

Continue reading What’s Wrong With SMS Authentication? Two IBM Experts Weigh In on the NIST Recommendation

Out With the Old, in With the New: Are You Ready to Move to IDaaS?

A move to IDaaS requires skill, knowledge and a small leap of faith, but the increased control over the cloud environment is well worth the elbow grease.

The post Out With the Old, in With the New: Are You Ready to Move to IDaaS? appeared first on Security Intelligence.

Continue reading Out With the Old, in With the New: Are You Ready to Move to IDaaS?

Five Signs of Identity Governance Trouble

Security leaders can manage their organization’s risk by identifying and remediating identity governance trouble before it leads to a damaging data breach.

The post Five Signs of Identity Governance Trouble appeared first on Security Intelligence.

Continue reading Five Signs of Identity Governance Trouble

Dangle Carrots in Front of Users to Correct Their Terrible Password Hygiene

Rewarding users for strong password selection can be a good way to eliminate terrible password hygiene throughout an organization.

The post Dangle Carrots in Front of Users to Correct Their Terrible Password Hygiene appeared first on Security Intelligence.

Continue reading Dangle Carrots in Front of Users to Correct Their Terrible Password Hygiene

Get the Identity Governance Scoop: Interview With an Expert

To learn more about identity governance and intelligence, we interviewed Andy Taylor, one of IBM’s identity and access management specialists.

The post Get the Identity Governance Scoop: Interview With an Expert appeared first on Security Intelligence.

Continue reading Get the Identity Governance Scoop: Interview With an Expert

The Top Four Reasons CISOs Are Adopting Cloud-Based Solutions for Identity and Access Management

As business moves to the cloud, it makes sense for CISOs to manage identity and access management functions with cloud-based solutions.

The post The Top Four Reasons CISOs Are Adopting Cloud-Based Solutions for Identity and Access Management appeared first on Security Intelligence.

Continue reading The Top Four Reasons CISOs Are Adopting Cloud-Based Solutions for Identity and Access Management

Audit and Security Come Together with Identity Governance and Intelligence at MISTI: SuperStrategies

The MITSI: SuperStrategies 2016 agenda is designed to help internal audit executives understand the challenges they face every day.

The post Audit and Security Come Together with Identity Governance and Intelligence at MISTI: SuperStrategies appeared first on Security Intelligence.

Continue reading Audit and Security Come Together with Identity Governance and Intelligence at MISTI: SuperStrategies

Cloud IAM Scenarios in Retail, Academia and Finance: Three Tips From an IDaaS Expert

The demand for IDaaS is expanding into every industry. Retailers, universities and financial institutions can benefit from adopting cloud IAM solutions.

The post Cloud IAM Scenarios in Retail, Academia and Finance: Three Tips From an IDaaS Expert appeared first on Security Intelligence.

Continue reading Cloud IAM Scenarios in Retail, Academia and Finance: Three Tips From an IDaaS Expert

Insider Threats in India: Is It Time to Focus on Privileged Users?

Insider threats can be even more devastating to an Indian organization than distributed denial-of-service (DDoS) or malware attacks.

The post Insider Threats in India: Is It Time to Focus on Privileged Users? appeared first on Security Intelligence.

Continue reading Insider Threats in India: Is It Time to Focus on Privileged Users?