The latest edition of the ISMG Security Report offers an analysis of the phases businesses will go through in the recovery from the COVID-19 pandemic, plus an assessment of new risks resulting from the work-at-home shift and lessons learned from the Equifax breach.
Supermarket giant Morrisons is not liable for a data breach caused by a rogue employee, Britain's Supreme Court has ruled, bringing to a close the long-running case - the first in the country to have been filed by data breach victims.
The Global Cyber Alliance is one of 13 nonprofit organizations that have banded together to offer businesses security tips for their newly remote workforces. Andy Bates, executive director of the alliance, discusses the coalition's core guidelines for reducing cyber risk.
As CISO of SoftBank Investment Advisers, Gary Hayslip is dealing with a familiar crisis management challenge: Supporting a remote workforce, with extra emphasis on secure identities. But he's also keeping a close eye on his team and the risks of burnout.
Zero Trust has become a cybersecurity marketing buzzword. But Kelsey Nelson of Okta sheds light on the realities of the Zero Trust approach, with a specific focus on the identity and access management component of the strategy.
One of the greatest challenges when migrating to Office 365 is how to manage identity. Read this 1 minute infographic to learn:
About the most common identity barriers when migrating to Office 365;
How to overcome those barriers;
How to simplify and accelerate your Office 365 deployment.
Gartner recently recognised Okta as a Leader in the "Magic Quadrant for Access Management" for the third year in a row. Additionally, Okta has been placed highest both "Ability to Execute" and "Completeness of Vision" making us the first vendor in the report's history to do so.
Okta believes this recognition from...
The Zero Trust security framework can be summarised in four words: never trust, always verify. In today's mobile and clouddriven world, traditional, network perimeter-oriented approaches to security aren't enough. Companies need to securely enable access for various users - such as employees, partners, contractors,...
Companies around the world are increasingly investing in apps and tools focused on security, data, and app development. Organisations are moving quickly to leverage the latest capabilities available, which is why we expect to see the turnover of popular apps continue in the next few years.
Read this report to...
As businesses constantly evolve and grow, so does an organisation's attack surface. The pace and velocity of technology transformation in enterprises has created a difficult environment for security teams to defend against threats.
Register for this upcoming live webinar and learn how:
Organisations need to adapt...
A poor customer experience and insufficient security in the account opening process has been shown to directly and negatively impact long-term customer loyalty, retention and profitability. So, how do you provide a better and more secure customer experience in the digital account opening process?
More than 100...
There is no more fundamental element in cybersecurity than identity. And in some ways, there's nothing harder to secure. Bil Harmer of SecureAuth calls identity "the last bastion" of cybersecurity, and he's eager to take it on in his new role.
Passwords are the access point to almost every system in our environment. Can they ever truly be replaced? John Bennett of LogMeIn talks about the steps necessary to create a secure, passwordless login experience.
Andre Durand has spent decades in the cybersecurity sector and had identity in his sights when he founded Ping Identity in 2002. Nearly 20 years later, the industry is embracing the notion that cybersecurity begins with secure identity.