Blog

Our top industry experts weigh in on topics that could affect you and your organization

  • Ensure Weak Identity Assurance Isn’t Hurting Your Investments in Strong Authentication and Leaving You Exposed to Cyber-Attack

    Posted on April 11, 2017 by Mark Coderre

    The weakest link in the identity chain is moving from authentication to identification, a shift typical of compliance driven programs emphasizing authentication, and recognized by the newly drafted National Institute of Standards and Technology (NIST) eAuthentication standard. NIST 800-63-A, B, & C guidelines establish identity enrollment, proofing, authentication, and federation guidelines. Learn More

  • Accelerate Your Digital Transformation in the Cloud

    Posted on March 2, 2017 by TUV NA Admin

    As organizations look to expand the use of public cloud platforms such as Amazon Web Services (AWS) and Microsoft Azure, they face many obstacles. The biggest obstacle is often the lack of a centralized, secure connectivity architecture that is required to interconnect clouds and data centers. This approach, enables cloud applications to communicate with applications in different cloud deployments as well as with resources on the corporate network. Learn More

  • Sound Security Architecture is the Key to Digital Identity Assurance

    Posted on February 1, 2017 by Seth Art

    The weakest link in the identity chain is no longer authentication; it has moved!

    The identity chain has many links (Identify, Provision, Authenticate, Federate, Manage, De-Provision), and for years the reliance on passwords has made authentication the weakest link. The use of passwords for user authentication is often the one piece of the cyber security system whose creation and safety is left in the hands its users; rather than being entrusted to its designer and administrators. Learn More

  • Six Steps to an Effective Incident Response Exercise

    Posted on September 2, 2016 by Mark Coderre

    Incident Response drills shouldn’t be viewed as overhead, or a discretionary spend, because a poorly executed response to a cyber security incident translates to material financial, regulatory, and reputational costs for your organization.

    Effective incident response requires preparation; this includes not only preventing incidents, by ensuring that systems are secure, but also establishing an incident response capability so that you’re confident your organization is ready to respond. Learn More

  • Unlock Your Cloud Potential by Consolidating Your Directory Infrastructure

    Posted on June 2, 2016 by Sally Guenette

    Enterprise technology infrastructure, application development and software services are moving to the Cloud. Cloud adoption involves integrating Identity and Access Management (IAM) systems with Cloud Single-Sign-On (SSO) solutions for federations and cloud-based security controls. Learn More

Before you leave…
want to sign up for our newsletter?