HackDig : Dig high-quality web security articles for hackers

How Authentication and Identification Work Together to Build Digital Trust

The dictionary definition of trust, according to Merriam-Webster, is the “assured reliance on the … truth of someone or something.” In today’s digital world, trust can be a tricky concept. To do business online, whether you are a bank, retailer, insurer, airline or anything else, you must have some degree of trust in your user — trust
Publish At:2019-10-18 10:20 | Read:1315 | Comments:0 | Tags:Fraud Protection Identity & Access Access Governance digital

Goldilocks Finds an Identity and Access Management Solution That Is Just Right

Goldie was uncomfortable. It was her first day on the new job and her desk chair was too hard. She’d ask for a softer chair later — for now she had other things on her mind. She’d been brought in to devise a new access management strategy, but the team was so strapped for time no one was available to train her. She was on her own. Goldie’s
Publish At:2017-10-23 17:50 | Read:4683 | Comments:0 | Tags:Identity & Access Topics Access Governance Access Management

Risk Governance: The True Secret Weapon of Cybersecurity

This season’s featured cybersecurity nightmare may be ransomware, but breaches of all kinds are going up in both numbers and cost. In response, security vendors are offering sophisticated — and costly — solutions to defend against evermore sophisticated attackers. However, the most effective protective measures have nothing to do with specific software
Publish At:2017-09-08 10:00 | Read:6221 | Comments:0 | Tags:Risk Management Access Governance Access Management Cybercri

Charting Your Identity Governance and Administration Adoption Road Map

We’ve witnessed almost a decade of identity governance and administration (IAG) disasters. In my experience implementing identity and access management (IAM) solutions for Fortune 100 companies around the world, I’ve seen my fair share of challenges. I’ve been called in to help fix problems related to too many manual processes, user compla
Publish At:2017-08-15 11:45 | Read:3916 | Comments:0 | Tags:Identity & Access Access Governance Governance Identity and

Why Is Identity Governance So Difficult to Get Right?

When was the last time you heard an identity governance and administration (IGA) success story? If you’re thinking “not in my organization,” you’re in good company. IGA projects have a reputation for being hard to complete, drawn out and costly. But why are they so difficult to get right? Measuring the Business Value of IGA Part of th
Publish At:2017-07-31 23:40 | Read:3452 | Comments:0 | Tags:Identity & Access Access Governance Access Management Govern

How Can You Quantify the Value of Web Access Enforcement?

In the world of security, there is a constant struggle to justify spending, show business value and quantify positive impacts. But too often there is not enough funding, and security becomes important only after a crisis. The value of the identity and access management (IAM) domains is different because it doesn’t just address risk — it can lead to ope
Publish At:2016-12-14 13:10 | Read:6120 | Comments:0 | Tags:CISO Identity & Access Access Governance Access Management i

Ground Control to Major CRO: Is Identity Governance a Risky Experience?

With the ongoing focus around security risk and compliance, governance is a hot topic within identity and access management. While identity governance is valuable for securing user access, properly deploying a governance solution can be a tricky endeavor. In a recent webinar, IBM and KuppingerCole brought together two identity governance gurus to discuss som
Publish At:2015-06-15 23:05 | Read:3696 | Comments:0 | Tags:CISO Identity & Access Access Governance Chief Risk Officer

What Leading Analysts Are Saying about IBM’s Acquisition of CrossIdeas

IBM recently acquired CrossIdeas, adding to the IBM Security Systems division and its existing identity and access management (IAM) portfolio. Prior to this acquisition, the company had already partnered with IBM in the Ready for IBM Security Intelligence program, and it integrated its identity and access governance solution platform with the IBM Security Id
Publish At:2014-08-23 04:40 | Read:4955 | Comments:0 | Tags:CISO Identity & Access access governance Acquisition audit c


Tag Cloud