HackDig : Dig high-quality web security articles for hackers

A Proposed New Trust Framework for Physical and Digital Identity Interactions

Identity is a difficult term to define in the cybersecurity world. The range of personal information that can be associated with an identity interaction is highly dependent on the situational context of the interaction. The definition of identity also depends on the context of the medium within which it is exchanged. In the physical world, when we talk about
Publish At:2020-03-13 07:59 | Read:753 | Comments:0 | Tags:Identity & Access Collaboration Compliance Customer Experien

Accelerate the Value Gain With Identity Governance and Administration

I frequently receive calls from identity and access management (IAM) leads at companies that just purchased an identity governance and administration (IGA) tool. They say, “I just bought this tool so I can automate the access recertification process, but where do I start? The pressure to succeed with this project is already starting to get out of contr
Publish At:2017-11-01 18:45 | Read:2893 | Comments:0 | Tags:Identity & Access Security Services Governance Identity and

Take a Hike: Navigating Your Identity Governance and Administration Process Engineering Journey

Most of the clients that I speak to say they understand the importance of the processes for identity governance and administration (IGA). These clients typically talk about the familiar people, processes and technologies of identity and access management (IAM), and many of them even consider processes to be a critical element for their IGA program. Unfortuna
Publish At:2017-09-19 12:00 | Read:3732 | Comments:0 | Tags:Identity & Access Identity and Access Governance (IAG) Ident

From Suspicious Activity to Suspended Account in Less Than a Minute: Stopping Insider Threats With Automation

Co-authored by Lauren Horaist. You read the headlines and understand industry trends. There are plenty of horror stories to reference. Organizations have had their reputations destroyed and entire corporations have gone out of business due to insider attacks. How can you avoid being the next victim? First, you need to understand what insider threats really a
Publish At:2017-09-13 08:20 | Read:3223 | Comments:0 | Tags:Cognitive Identity & Access Security Intelligence & Analytic

e-Signature Security Speeds Government Paperwork Along

As public administrators have learned, efficiency in government is largely a matter of executing the small things well. A saved mailing expense or avoided delay can add up to a lot more work for a lot less tax money, which is one practical definition of good government in action. One example of this process is a current U.S. Census Bureau initiative to imple
Publish At:2017-09-11 19:25 | Read:7888 | Comments:0 | Tags:Data Protection Fraud Protection Government Authentication D

Charting Your Identity Governance and Administration Adoption Road Map

We’ve witnessed almost a decade of identity governance and administration (IAG) disasters. In my experience implementing identity and access management (IAM) solutions for Fortune 100 companies around the world, I’ve seen my fair share of challenges. I’ve been called in to help fix problems related to too many manual processes, user compla
Publish At:2017-08-15 11:45 | Read:3831 | Comments:0 | Tags:Identity & Access Access Governance Governance Identity and

Why Is Identity Governance So Difficult to Get Right?

When was the last time you heard an identity governance and administration (IGA) success story? If you’re thinking “not in my organization,” you’re in good company. IGA projects have a reputation for being hard to complete, drawn out and costly. But why are they so difficult to get right? Measuring the Business Value of IGA Part of th
Publish At:2017-07-31 23:40 | Read:3324 | Comments:0 | Tags:Identity & Access Access Governance Access Management Govern

Identity and Access Governance: Lessons From the Front Line

Authored by Daniel Poliquin, principal of Deloitte & Touche LLP. I’ve seen this situation again and again: After investing thousands — often millions — to equip their enterprise with automated identity and access governance technologies, the organization’s system is breached. How does this happen? A closer look may show that even though appro
Publish At:2017-03-17 13:20 | Read:3840 | Comments:0 | Tags:Identity & Access IBM InterConnect Identity and Acces Govern

Reimagining the Future of Identity Management With Blockchain

Every business and social transaction is carried out by people. People are known by their identities. Hence, identity drives every business and social interaction. In today’s digital age, an individual’s identity is not defined by a single attribute such as a name, address or user ID. Rather, it is a collection of attributes including, but not li
Publish At:2017-03-08 04:55 | Read:6210 | Comments:0 | Tags:Identity & Access Blockchain Digital Identity identity Ident

IBM Is a Leader, Again, in the 2017 Gartner Magic Quadrant for IGA

IBM Security was again named a Leader in the newly published “2017 Gartner Magic Quadrant for Identity Governance and Administration.” This is the third consecutive year IBM Security has been named a Leader in the identity governance and administration (IGA) Gartner Magic Quadrant. Highlights From the Magic Quadrant for IGA Security starts by und
Publish At:2017-02-27 11:15 | Read:4069 | Comments:0 | Tags:Identity & Access Gartner Gartner Magic Quadrant IBM IBM Sec

Protect Your Crown Jewels Against the Insider Threat: Know Your Users, Know Your Data

Crown jewels like Colonel Sanders’ secret recipe, Google’s search algorithm and the formula for Coca-Cola are all protected under lock and key against the dreaded insider threat. Your organization’s crown jewels might include customer data, proprietary algorithms, supply chain optimization tactics, your own secret recipes and more. Do you k
Publish At:2017-01-10 18:05 | Read:3557 | Comments:0 | Tags:Identity & Access Data Protection Data Security Identity and

How Can You Quantify the Value of Automated Provisioning and Deprovisioning?

IT managers face a constant challenge to justify spending, demonstrate business value and quantify the impact of security incidents. Organizations too often fail to prioritize security until a crisis arises. Identity and access management (IAM) domains are key because they enable IT teams to address risk and facilitate operational and revenue gains. Automate
Publish At:2017-01-05 04:00 | Read:4912 | Comments:0 | Tags:Identity & Access Cybersecurity Identity and Access Manageme

Security Starts With People: Three Steps to Build a Strong Insider Threat Protection Program

Insider Threat: Not Like the Movies The hacker is hunched over his machine, the hood of his gray sweatshirt covering his hair and plunging his face in shadows as he types feverishly on a black keyboard. Using his considerable skills, he infiltrates some of the best-guarded corporations, stealing valuable data and millions of dollars. He is halfway across the
Publish At:2016-12-06 01:50 | Read:4539 | Comments:0 | Tags:Identity & Access Access Management Data Protection Data Sec

Security Starts With People: Know Who They Are, Know What They Do

Each day, in every corporation, school, government organization and nonprofit, people are generating great value for the economy by creating, manipulating and interacting with precious information. In fact, much of the value in today’s economy is created and stored digitally, from intellectual property, trade secrets and customer lists to the actual do
Publish At:2016-11-29 22:30 | Read:4445 | Comments:0 | Tags:CISO Identity & Access Biometric Security Biometrics Identit

Gartner IAM Summit and Upcoming Webinars Highlight Identity Governance and Intelligence

The holiday season is a time to reflect on what is really important in life and what brings us all together. That, of course, is identity governance. IBM Security’s Identity Governance and Intelligence solution will be celebrated at three major upcoming events: the 2016 Gartner IAM Summit, a webinar focused on health care and an analyst webinar in whic
Publish At:2016-11-21 11:50 | Read:3627 | Comments:0 | Tags:Health Care Identity & Access Gartner Identity Analytics and

Tools

Tag Cloud