How to Report on Your IAM System’s Success

At a certain point in your ongoing push to modernize security at your organization comes the moment of truth: time to present your initiatives, and your results, to your board of directors (BOD). In the past, you may have gotten by with little more than a cursory explanation, touching on little more than compliance issues, but in 2017, cybersecurity no longer flies under the BOD’s radar.

Read More

How CEOs Can Drive Adoption of Identity and Access Management and Other Cybersecurity Programs


By this point in our series on security and the CEO, it should be clear that security isn’t just a technological issue. It’s a cultural one, and you must improve your organization’s security culture, as well as its security processes and technologies. To accelerate your digital transformation, security must become part of your company’s very DNA. That’s where the CEO comes into play.

Read More

Your Action Plan for Addressing Ransomware


In 2017, ransomware, the use of weaponized encryption to block access to a computer system or service until a ransom is paid, is all the rage among hackers. In fact, ransomware is now one of the top three most common malware threats.

The situation is dire, with hackers requesting ransoms of up to $73,000 per attack. Ransomware payments totaled more than $1 billion in 2016, a massive jump from the mere $34 million paid in 2015.

Read More

Your Information Security Situation: Does Your CEO Know the Truth?


The digital transformation of the last two decades has placed cybersecurity front and center on the CEO agenda. Customers now place vast quantities of personal information into the hands of businesses, with the expectation of a certain amount of privacy and confidentiality in exchange. The ability to meet this expectation is crucial in order for a business to retain customers and build its brand.

Read More

5 Information System Security Predictions for 2017


So, what does 2017 have in store for the security industry? While there’s no crystal ball that can tell us for sure, we’ve got our eye on a few key trends.

Entering a new year, we always take a look at what the latest in identity and access management  (IAM) and cybersecurity threats means for the security industry. This year, we specifically focused on answering three key questions:

Read More

What Does Accenture’s Cybersecurity Report Mean for Businesses?


A recent survey conducted by Accenture found that over the past year, roughly one in three targeted attacks resulted in an actual security breach. When you consider that the average company faces more than one hundred focused attacks launched against them every year, these numbers are alarming. This equates to more than 30 successful data breaches every year against a single company, with just one data breach having the potential to result in millions of dollars in losses.

Read More

Corporate Governance is More Than a Good InfoSec Policy

*Disclaimer: This article originally appeared on IDG Connect

Over the past few years, Governance, Risk, and Compliance (GRC) have become three of the hottest topics in Information Technology circles. The growing demand for compliance with federal and state laws, as well as industry best practices, has necessitated a closer look at IT governance, as well as solutions that help to ensure an organization has invested their time and efforts wisely, through management and implementation of such technologies as access control, data protection, and identity provisioning and management. Proper design, application, and usage of these key technologies (and others) help to control necessary risk management activities and ease the efforts that are required to remediate or address areas where compliance is lacking. 

Read More

5 Signs You Need to Upgrade Your Legacy IAM

*Disclaimer: This article originally appeared in SecurityWeek

IT leadership is a constant balancing act, especially as you must look for ways to advance your department as an engine for growth rather than a cost center. Unfortunately, time and resources for revenue-stimulating, strategic IT initiatives are often in short supply, thanks to the demands of mundane, but critical, day-to-day tasks. Of the day-to-day tasks that often become major resource drains, user identity and access management (IAM) is not only one of the most crucial to get right, but can also be one of the most problematic.

Read More

The 2 Most Common IDaaS Misperceptions


In our last post, we discussed some of the most compelling reasons for adopting identity and access management (IAM) in the cloud. Like most other cloud services, identity as a service (IDaaS) offers cost-effective, high availability and affordable scalability. However, as you consider the possibility of moving from your legacy, on-premises IAM system to the cloud, it’s vital that you begin with a clear understanding of common misperceptions that haunt the emerging IDaaS market; here are the two biggest ones:

Read More

Why All the Interest in Cloud-Based IAM?


It’s practically a given that at least some of your IT systems and operations are in now in the cloud. In fact, 70 percent of small businesses and 90 percent of midmarket enterprises do, and the rest must begin to do so soon or risk falling behind their competition. According to Cisco, 83 percent of all data center traffic will be based in the cloud within the next three years; 2017 will see a particularly significant migration of workloads moving to cloud-based platforms, with IT modernization leading the way.

Read More

Subscribe Here!