Should Data be Masked?
The prospect of losing personal information (PI) should terrify most organisations. But PI is essential to success. Here are several mitigation strategies.
The prospect of losing personal information (PI) should terrify most organisations. But PI is essential to success. Here are several mitigation strategies.
Organisations are finally getting serious about cyber crime. But this is only one type of criminal activity, and IT departments must be equally vigilant against other types of crime.
Rather than just buying into the latest cyber security tools, many organisations can enhance their defensive posture against ransomware by adopting a few manageable operational activities
As many enterprises recognise the advantages of biometric authentication over traditional call centre verification methods, biometric voice recognition is increasing in popularity as a secondary source of identification due to its speed and user-friendliness.
Digital customer convenience remains a top priority among users even if consumers acknowledge the necessity of defending their personal information against malicious actors. How have customer perceptions evolved to what they are today, and what can be done to influence better identity and access management practices among enterprises?
Will open-source finally link security tools effectively? Vendors are now driving integration of information.
Even with privileged access management (PAM), organisations can still fall prey to cyber attacks. This is evident in a number of high-profile security breaches against global organisations which have caused severe financial losses.