Identity and access management products



Preventing identity theft in a data breach
In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
News : Identity and access management products
-
January 14, 2021
14
Jan'21
APAC firms grapple with cyber security amid pandemic
Some aspects of cyber security have taken a backseat as companies across the Asia-Pacific region rush to shore up their infrastructure to cope with the demands of remote work
-
January 13, 2021
13
Jan'21
Three-quarters of finance firms report more potentially criminal activity in their networks
Fears of failing to comply with strict regulations grow as financial services firms identify more suspicious financial activity on their networks
-
January 12, 2021
12
Jan'21
Palo Alto Networks opens Australia cloud location
The cyber security company’s Australia cloud location will address data localisation requirements amid growing adoption of cloud-based security services
-
January 12, 2021
12
Jan'21
Mimecast latest security firm to be compromised
Users of a specific Mimecast certificate used to authenticate services to Microsoft Office 365 may be at risk of compromise in an attack that may relate to the ongoing SolarWinds incident
In Depth : Identity and access management products
-
Picking the right IAM tools is based on more than today’s needs
With remote working now normal, it is important to take proactive steps in managing credentials across platforms that can be subject to multiple data protection regulations. IAM services can streamline this process, but care must be taken to ensure the correct one is chosen Continue Reading
-
Security Long Reads: Cyber insiders reveal what’s to come in 2021
In this long read, we gather together the thoughts of cyber security insiders from across the industry to get their take on what will happen in 2021 Continue Reading
-
Post-pandemic approaches to IAM for cloud security
Cloud technology may have saved businesses from catastrophe during the pandemic, but it has also introduced additional challenges around identity and access management. Here’s why IAM policies are crucial in the new normal Continue Reading
Blog Posts : Identity and access management products
-
Throwback Thursday: the authentication arms race continues
As our contribution to the bit of fun that is Throwback Thursday, we're taking a weekly stroll in the Freeform Dynamics archives. This week we are heading back to 2006, when we reported on that ... Continue Reading
-
What next for digital identity in the UK? Industry welcomes latest DCMS plan
After months – some would say years – of frustration and delay, tech suppliers have largely welcomed the latest government initiative to establish a digital identity ecosystem in the UK. The ... Continue Reading
-
Even GDS is telling GDS to shut down Verify
The ailing Gov.uk Verify digital identity system was given a Frankenstein’s monster-like burst of energy back in April, when the lockdown-induced surge in Universal Credit applications brought ... Continue Reading
Opinion : Identity and access management products
-
Security Think Tank: Cyber effectiveness, efficiency key in 2021
After a year of unprecedented disruption thanks to Covid-19, it looks like remote working is set to remain with us for now, which means security strategies will change in 2021. What will this change look like, and what tools and services will be selling like hot cakes? Continue Reading
-
How to manage non-human identities
Identity management has traditionally focused on human identities, but non-human identities are proliferating and must not be overlooked. Businesses can reduce risk by managing both types of identity in the same way using a services-based approach Continue Reading
-
How to modernise identity governance and administration
Modernising identity governance and administration (IGA) capabilities is essential for organisations to manage identities effectively to ensure they remain competitive, compliant and secure Continue Reading
Videos : Identity and access management products
-
Video: Lauri Love – why we need volunteers to fight malware
Lauri Love talks to Computer Weekly about plans to collaborate with others to tackle malware and use cryptocurrencies to create new ways for businesses to work
-
CW500 video: Security and IoT
What can businesses do to ensure their IAM and security systems are able to support internet connected things
-
CW500 video: Douwe Mik, EY, on security and the IoT
What can businesses do to ensure their IAM and security systems are able to support internet connected things