Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Centrify has made enhancements in the areas of secure user provisioning, license management, single sign on (SSO) and mobile device management for Office 365 (O365).
Japan's largest mobile service provider, NTT DoCoMo, said it would replace passwords with biometric credentials on a number of its online services, in a step to move users closer to a password-free world.
RSA has unveiled a new identity and access management solution. RSA Via includes solutions for authentication, identity and access management, and identity governance.
Cryptzone launches AppGate Secure Access, a gateway solution that provides a secure tunnel between users and apps to prevent unauthorized access.
ThreatMetrix unveils Digital Identity Network, an identity protection solution based on device and behavior profiles created through the analysis of 1 billion transactions per month.
The "Re-Direct to SMB" vulnerability impacts all versions of Windows, including the upcoming Windows 10, as well as products from major software makers such as Adobe, Apple, Oracle, and Symantec.
Early Warning said on Tuesday that it has signed a definitive agreement to acquire Authentify Inc., a provider of phone-based, multi-factor authentication solutions.
The new Windows 10 operating system will allow users to sign in to a device without a password by using biometrics, including facial recognition.
Yahoo announced a new way to let users to login to their account without the need for a password. With the new features, when signing in, an on-demand password is texted directly to a user’s mobile phone.
Barracuda Networks has rebranded its eSignature product SignNow to CudaSign, and will offer the solution at just $1per user per month.

FEATURES, INSIGHTS // Identity & Access

rss icon

Travis Greene's picture
Can IT security find a way to coexist with wearables faster than the first BYOD war and avoid a second war?
Travis Greene's picture
No IT organization has a seemingly unlimited budget the way that Team Oracle did in the 2013 America’s Cup race. But look closer at why spending on America’s Cup racing seems so out of control and it starts to look a bit more familiar.
Travis Greene's picture
Security teams must bear equal, if not more responsibility, for reducing the risk of credential fatigue leading to inadvertent exposure.
Wade Williamson's picture
Network administrators have to remember that they are not just the protectors of the organization – they are also the most valuable targets.
Travis Greene's picture
Just like fumbles and interceptions derail a playbook plan, there are two ways that access certifications today are insufficient.
Travis Greene's picture
Like those college recruiting compliance departments that are constantly training, monitoring, and enforcing policies, the IT compliance activity of access certifications needs to become more intelligent and real-time.
Travis Greene's picture
It’s time for targeted complexity that balances the convenience that users demand with the security that organizations need. It’s a bit like teaching a new dog old tricks.
Scott Simkin's picture
It doesn’t take the most advanced tools to break into the the largest corporations on the planet. Between user behavior and the types of malicious files attempting to compromise enterprises, there are a few steps you can take to reduce your risk exposure.
Travis Greene's picture
When it comes to protecting against insider threat, there can be an over-reliance on policy and automated enforcement. Access Governance is a powerful tool to reduce the insider threat, but it needs to mature to the point where it is more responsive and more automated before relying on it completely.
Travis Greene's picture
The combination of access governance and self-service access request and approval provides the best approach to strike back at the access clones.