Data collected through customer identity and access management can play an important role in fraud investigations, says Simon Marchand, chief fraud prevention officer at Nuance Communications.
An investigation at the U.S. Treasury Department has found that it suffered a "significant" breach as a result of the SolarWinds Orion supply chain attack, a top Democrat on the Senate Finance Committee reports. Meanwhile President-elect Joe Biden said of the attack: "I promise you, there will be a response."
Multi-cloud and hybrid cloud solutions are great enablers for organizations, but managing IAM across multiple entities that are ever expanding in capability and use? Big challenges. But here's an opportunity to re-do enterprise IAM. Join Tom Malta of Navy Federal Credit Union for insight on:
Business...
Security teams must explain to business leaders how customer identity and access management can help with customer retention, says cybercrime and fraud expert Lenny Gusel.
Why identity is your #1 security problem
Watch the Computer Weekly interview
Bryan Glick, editor-in-chief at Computer Weekly, speaks to Okta's Max Faun about identity and security, covering:
Why 81% of cybersecurity breaches are password-related
How Customer Identity and Access Management (CIAM) can help you...
Critical authentication vulnerabilities contained in certain GE Healthcare medical imaging products could allow attackers to gain access to sensitive patient data, alter data and affect the availability of the equipment, according to new advisories from the vendor and the U.S. Department of Homeland Security.
Knowing your customer has become of more a challenge in a world where in-person interaction has become scarce. Andrew Bud of iProov discusses how identity proofing is evolving to meet the challenge.
Every company must become a technology company. Your customer’s requirements are changing with the explosion of channels, devices, platforms and touchpoints. And secure experiences with those interactions is paramount.
CIAM is foundational technology that meets increasingly complex customer requirements and...
Securely connecting users to applications is not a new problem, and to address this challenge, organizations traditionally adopted Web Access Management (WAM) solutions to secure login and reduce friction for users when accessing web applications on-premises.
The Okta Platform and migration strategy offers a...
Identity attacks such as phishing, credential stuffing, brute-force-attacks, etc. are increasingly common and sophisticated methods for committing account takeovers. These attacks result in increased security risks, brand damage and outright fraud.
Additionally, today’s customer expects seamless access with...
As the leader in identity and access management (IAM), Okta has worked with thousands of companies to achieve their security and usability goals. We’ve learned that no matter how far along each company is on their identity journey, there’s a common set of challenges they face at every step.
In this eBook, we...
Customer engagement is an important metric for success, but just how important is it? To find out, Okta surveyed 100 engineering executives from enterprise organizations, and learned that today’s customers expect technology to be fast, frictionless, omni-channel, and secure.
This edition of the ISMG Security Report features an analysis of a serious Apple iOS "zero-click exploit" that could have allowed hackers to remotely gain complete control of a device. Also featured: a discussion of identity proofing challenges and a review of New Zealand's updated Privacy Act.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.