Posted on February 1, 2017 by Seth Art
The weakest link in the identity chain is no longer authentication; it has moved!
The identity chain has many links (Identify, Provision, Authenticate, Federate, Manage, De-Provision), and for years the reliance on passwords has made authentication the weakest link. The use of passwords for user authentication is often the one piece of the cyber security system whose creation and safety is left in the hands its users; rather than being entrusted to its designer and administrators. Learn More
Posted on September 2, 2016 by Mark Coderre
Incident Response drills shouldn’t be viewed as overhead, or a discretionary spend, because a poorly executed response to a cyber security incident translates to material financial, regulatory, and reputational costs for your organization.
Effective incident response requires preparation; this includes not only preventing incidents, by ensuring that systems are secure, but also establishing an incident response capability so that you’re confident your organization is ready to respond. Learn More
Posted on June 2, 2016 by Sally Guenette
Enterprise technology infrastructure, application development and software services are moving to the Cloud. Cloud adoption involves integrating Identity and Access Management (IAM) systems with Cloud Single-Sign-On (SSO) solutions for federations and cloud-based security controls. Learn More