Archive for: September 2018

Thwarting Hackers with Risk-Based Authentication

The increased use of mobile and cloud services improves business agility by enabling anywhere, anytime access to applications and data. By opening up the network perimeter, however, it makes it difficult to ensure that only authorized users are accessing critical assets. Traditional authentication with user names and passwords has become increasingly inadequate for a number of reasons. Password fatigue...

Is Blockchain the Answer to Identity Management?

The ideal in identity management is to have a single source of truth — one repository that holds a unique ID for each user and allows users to access all the resources they’re entitled to. Very few (if any) organizations have achieved this ideal. In most cases, users maintain multiple sets of credentials to log into various systems. Single...

How to Gain Strong Authentication across the Extended Enterprise

As organizations implement cloud, mobile and Internet of Things platforms, applications and devices are moving outside the physical boundaries of corporate headquarters. Identity has emerged as the new perimeter to these borderless networks, and a preferred attack vector used by cyber criminals to breach systems and exfiltrate sensitive data. The cloud in particular raises concerns about the risk of...