HackDig : Dig high-quality web security articles for hackers

Explained: cloud-delivered security

As a counterpart to security for your assets in the cloud, you may also run into solutions that offer security from the cloud. These solutions are generally referred to as cloud-delivered security. Cloud-delivered security is sometimes called security-as-a-service which we will avoid here as it might be confused with the more generally used term Software-as-
Publish At:2020-05-18 13:43 | Read:107 | Comments:0 | Tags:Explained cloud iaas identity management MSP paas saas small

How CIAM Addresses the Challenges of Consumer Identity Management

Consumer identities are at the heart of brand engagements today. Digital interactions are a routine part of our lives and touchpoints for consumers have reached astounding heights. Nearly 60 percent of the world is digitally connected and more than half of the world’s population will be using social media by the middle of 2020, according to We Are Soci
Publish At:2020-03-19 08:08 | Read:421 | Comments:0 | Tags:Identity & Access Security Services Business Continuity Comp

Workforce Versus Consumer IAM: Key Differences and Use Cases

As a consumer, have you ever visited an online retail site only to be bombarded by a pop-up window asking for your email address in order to get a nominal discount? Or consider the process of exploring a home mortgage with a major financial institution. Your first interaction with the bank or financial institution prompts a request for your Social Security i
Publish At:2020-03-02 08:32 | Read:343 | Comments:0 | Tags:Identity & Access Security Services Access Management Authen

Fintech security: the challenges and fails of a new era

“I have no idea how this app from my bank works, and I don’t trust what I don’t understand.” Josh is not an old curmudgeon or luddite. He’s 42 with a decent understanding of technology. Nevertheless, the changes in fintech have come too fast for him. It’s not that he doesn’t trust his bank. He doesn’t trust him
Publish At:2020-02-05 16:55 | Read:459 | Comments:0 | Tags:Vital infrastructure cryptocurrency finacials fintech gdpr g

Explained: the strengths and weaknesses of the Zero Trust model

In a US court of law, the accused are deemed to be innocent until proven guilty. In a Zero Trust security model, the opposite is true. Everything and everyone must be considered suspect—questioned, investigated, and cross-checked—until we can be absolutely sure it is safe to be allowed. Zero Trust is a concept created by John Kindervag in 2010 during his
Publish At:2020-01-28 16:50 | Read:640 | Comments:0 | Tags:Explained byod cloud framework identity management insider t

A ‘Star Trek’ Darkly: To Boldly, Securely and Easily Go to the Cloud

For the past 50 years, “Star Trek” has served as our template for tomorrow. While there are still hurdles to overcome before we can traverse the stars at warp speed, many of Gene Roddenberry’s visions of advanced technology have come to life. The first tricorders Bones and Captain Kirk fantastically flipped open in “Star Trek: The Ori
Publish At:2017-09-26 09:56 | Read:4870 | Comments:0 | Tags:Cloud Security Identity & Access Cloud Cloud Identity Servic

e-Signature Security Speeds Government Paperwork Along

As public administrators have learned, efficiency in government is largely a matter of executing the small things well. A saved mailing expense or avoided delay can add up to a lot more work for a lot less tax money, which is one practical definition of good government in action. One example of this process is a current U.S. Census Bureau initiative to imple
Publish At:2017-09-11 19:25 | Read:7587 | Comments:0 | Tags:Data Protection Fraud Protection Government Authentication D

Current Trends in Identity and Access Management: July 2017

Identity and access management (IAM) is a mature and well understood domain of security. That doesn’t mean it’s static. While IAM is commonly associated with security — indeed, it is an essential part of a holistic security program — many people are beginning to understand the business processes it represents as well. They therefore view it as an
Publish At:2017-07-05 12:40 | Read:3958 | Comments:0 | Tags:CISO Cloud Security Identity & Access Security Intelligence

Digital Transformation Means Infusing Identity Everywhere

Organizations are rapidly adopting new technologies such as cloud, mobile and the Internet of Things (IoT) to facilitate and accelerate digital transformation. Securing these environments means managing identities throughout the organization, and next-generation identity and access management (IAM) strategies must give IT the ability to swiftly enable cloud,
Publish At:2017-06-14 01:00 | Read:4371 | Comments:0 | Tags:Cloud Security Identity & Access Access Management Cloud Clo

Securing the Digital Economy With Federated Identity Management

As the global digital economy grows, the number of digital identities rises, and so does the need to protect and manage how personal information is collected, used and distributed. Managing digital identities is key in the online world and finding the proper way to authenticate legitimate users is one of the greatest challenges. When digital identities are n
Publish At:2017-05-02 19:00 | Read:4028 | Comments:0 | Tags:Identity & Access Authentication Digital Identity federated

Five Steps to Propel Your Privileged Identity Management Strategy to the Next Level

Privileged users are probably the greatest threats to your data security. These users literally have keys to your kingdom’s treasury of sensitive customer data and business-critical assets. Five Steps to Become a Privileged Identity Management Pro It is extremely important to properly track and monitor these privileged users because they can easily dis
Publish At:2017-03-09 17:45 | Read:2914 | Comments:0 | Tags:Identity & Access Identity and Access Management (IAM) Ident

Reimagining the Future of Identity Management With Blockchain

Every business and social transaction is carried out by people. People are known by their identities. Hence, identity drives every business and social interaction. In today’s digital age, an individual’s identity is not defined by a single attribute such as a name, address or user ID. Rather, it is a collection of attributes including, but not li
Publish At:2017-03-08 04:55 | Read:5853 | Comments:0 | Tags:Identity & Access Blockchain Digital Identity identity Ident

Okta partners with Google to secure cloud identities

Identity management vendor Okta and Google have announced a partnership aimed at getting enterprises to secure their users' identities in the cloud.As part of the deal, Google will use Okta as its preferred identity provider for Google Apps enterprise customers. Businesses that buy a ton of Apps for Work licenses will also be encouraged to use Okta's ser
Publish At:2016-08-30 18:25 | Read:3535 | Comments:0 | Tags:Security Cloud Computing Identity Management Software as a S

Use Tor? Riffle promises to protect your privacy even better

Privacy-minded people have long relied on Tor for anonymity online, but a new system from MIT promises better protection and faster performance.Dubbed Riffle, the new system taps the same onion encryption technique after which Tor is named, but it adds two others as well. First is what's called a mixnet, a series of servers that each permute the
Publish At:2016-07-16 01:15 | Read:2840 | Comments:0 | Tags:Security Privacy Encryption Identity Management

IDG Contributor Network: Protecting yourself from Google’s protection racket

About a week ago at Google I/O, Google said it would begin testing in June an alternative to passwords. People have been talking about eliminating passwords for years. They’re hard to remember, particularly when one has dozens of them. Some people have hundreds.And people tend to mismanage them — the classic sticky note on the side of the monitor is only
Publish At:2016-06-01 02:35 | Read:3502 | Comments:0 | Tags:Security Biometrics Cloud Security Identity Management Mobil


Share high-quality web security related articles with you:)


Tag Cloud