Sunday, 25th August 2019
Logo
BLOG

The future of passwords in the enterprise

Weak passwords have plagued businesses and security parameters for generations. People tend to set passwords that are easy for them to remember without considering how a weak password will impact the security of their data. This translates to corporate environments where employees tend to use personal passwords, meaning they are inevitably putting their corporate network at risk as it is now far easier for cybercriminals to get hold of an individual's’ personal information and, in turn, company...

Read More

BLOG

The implications of integrating facial authentication to protect customer data

Identity theft has become a major problem. It has steadily escalated globally as the need for digital identities continues to rise. In the UK, it was reported that 174,523 cases of fraudulent activity were identity fraud, with 95% involving the impersonation of someone else, and eight out of ten fraudulent applications were made online. By Steve Cook, VP of business development of EMEA at FaceTec.

Read More

BLOG

IAM and GDPR: How can security teams ensure they work in tandem?

As organizations digitally transform, critical systems and sensitive information can be accessed by more users in an organisation than ever before. With the added pressure of GDPR, organisations have to ensure that strong security practices are implemented in the systems that people use to access data. This is where Identity Access Management (IAM) and Data Access Governance (DAG) comes in, giving granular access to the systems and data individuals use. Like with any security implementation howe...

Read More

BLOG

IT weaknesses - the barrier to enterprises becoming security-first

Enterprises are increasingly recognising the benefits of embracing a cloud infrastructure to support on-premise networks, but often create complicated network environments in the process. By Justin Calmus, Chief Security Officer at OneLogin.

Read More

BLOG

What’s the key to secure digital transformation?

Marc Vanmaele, CEO of TrustBuilder explains how banks and financial organisations can best balance the needs of security and user experience as they evolve their IT and processes.

Read More

BLOG

HR: The new central source of truth for business IT

Businesses the world over are facing ever increasing pressure to adapt and evolve their IT strategies to keep pace with technology to attract and maintain a productive, talented and happy workforce. However, it’s not just as simple as starting a fresh IT strategy, particularly as many businesses at an enterprise level have decades of legacy IT to contend with. By Dan Power, UK regional manager at OneLogin.

Read More

Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more