Is This the LAST PASS for Password Managers
Does the LastPass breach signal the end for password managers?
Does the LastPass breach signal the end for password managers?
The prospect of losing personal information (PI) should terrify most organisations. But PI is essential to success. Here are several mitigation strategies.
The limited exposure of non-technical staff to the basics of identity and access management (IAM) can result in serious consequences for the organisation’s exposure to security breaches. This guide aims to bridge the knowledge gap in best practices for enterprises that need to develop a business case for IAM, and to realise its organisation-wide impacts.
In the aftermath of the Optus breach, organisations are likely to see increased regulation and penalties in cases where private information in their possession has not been adequately protected.
As many enterprises recognise the advantages of biometric authentication over traditional call centre verification methods, biometric voice recognition is increasing in popularity as a secondary source of identification due to its speed and user-friendliness.
Digital customer convenience remains a top priority among users even if consumers acknowledge the necessity of defending their personal information against malicious actors. How have customer perceptions evolved to what they are today, and what can be done to influence better identity and access management practices among enterprises?
Some great outsourcing news this month, as well as a few indications government agencies are really looking to alter their IT procurement and oversight frameworks. The developments in this area in the coming months are likely to be interesting and hopefully beneficial for everyone in the industry.
You are investing in cyber security, but are you tracking your efforts with metrics and KPIs?
In the first of this two-part series, IBRS discusses what benefits managed services for identity and access management (IAM) can deliver to enterprises and how these advantages can help them attain more consistent security compliance measures.