Zero Trust

IAM in a shifting environment

The fourth annual Identity Management Day (April 9) brought the opportunity to assess and evaluate the shifting environment plaguing Identity and Access Management (IAM).

Identity plays a pivotal role in all facets of business functions. Overseeing identity and access presents challenges in determining who should have access to what.
This process requires a contextual understanding of the roles and duties of numerous individuals within an organization, ranging from system owners and supervisors to IT, security, and compliance personnel. Managing access between all these stakeholders and decision-makers while mitigating human error, minimizing excessive permissions, and preventing inappropriate access configurations presents a formidable task.

As workforces evolve, managing access privileges becomes even more complex, raising the risk of insider threats and unauthorized access. Understanding identity management is crucial across all business activities, especially with the rise of hybrid and remote work setups.

A strong IAM strategy requires enterprises to maintain a centralized and consistent view of all devices, resources, data, and users, along with timely provisioning of access to different users. When any of these elements are insufficiently operated, both the level of cybersecurity and the quality of user experience are jeopardized.

Photo of Person Pointing a Handgun

Tracking 2024’s top three cybersecurity threats

From our predictions issue: As 2024 gets underway, here are three threats which promise to be making waves in the coming year.

This content is for Free and Premium members only.
Login Join Now
One person whispering in the ear of a newspaper reader, distracting him while the world burns

Before you post, would you bet your job on it?

In a world awash in AI-generated, intentional misinformation and urban myths, would you bet your job on the reliability of the information you want to share? You might be betting someone’s life on it.

Black Friday Fears: Beating Cybercriminals to the Bargains

Each year Black Friday grows in popularity, and Cyber Monday is now a key part of the sales weekend. But, this growth of popularity has sparked the interest of cybercriminals, who are also out to exploit the vast number of people online trying to bag a bargain.

close-up photography of person lifting hands

Navigating an identify-based approach to data security

Today, everyone is trying to solve the problem of what happens when credentials are compromised, and a network is breached. The simplest approach is to minimise movement until security teams can resolve the incident.

a group of carved pumpkins with glowing faces

Navigating the Digital Battleground – Expert Voices on Cybersecurity Awareness Month

As October is coming to an end with eerie Halloween celebrations, we’d like to remind everyone that today also marks the last day of National Cybersecurity Awareness Month.

Unpacking the 15-min phone call that took down MGM/Caesars

The MGM Grand/Caesar’s breach is the most exhaustively covered cyber event in recent memory. Even the attackers published detailed explanations of how they did it. There was, however, one question still needs answering:

eye, iris, biometrics

Why Insider Threats Need a Zero Trust Approach

Insider threats are more commonplace than one would expect. But what can be done to prevent them? Zero Trust is one answer – so we spoke to several industry experts to learn what they have to say on the topic.

Zero Trust – mit Identitäts-Orchestrierung schnell zum Ziel

Das Sicherheitskonzept Zero Trust senkt das Risiko erfolgreicher Cyberangriffe auf IT-Infrastrukturen. Dennoch tun sich viele Unternehmen nach wie vor schwer mit einer erfolgreichen Implementierung. Denn: eine umfassende Neuausrichtung aller registrierten digitalen Identitäten ist ein komplexes Unterfangen, das viel Zeit und

Zero Trust Principles for Mid-Market Companies

The arena of Zero Trust is an unbridled circus. Conflicting best practices, classic overselling, and niche use cases abound making two things painfully clear: 1) organizational leadership is making Zero Trust a top priority, and 2) the folks tasked with implementing it have no idea where to start.

Standards bodies doing the heavy lifting in AI regulation

As with any digital product, security relies on four arenas. User responsibility, corporate accountability, government regulation and industry standards.

Ransomware: How to Prevent and Recover From an Attack

Ransomware attacks have cost victims millions upon millions of dollars, and these attacks are increasing at an alarming rate. This article will explore effective strategies to prevent and recover from these ambushes.

Gray Clouds

SAP Security Does Not Have To Be Complex

SAP security doesn’t need to be complex, since a lot of tasks can be automated – but what about SAP security in the cloud?

white heart shaped balloon on white surface

Identity Management Day: the power of Prevention and Protection

Today marks the 3rd annual Identity Management Day. We spoke to a range of tech security professionals about how businesses can ensure digital identities remain secure.

Bank collapse drives Phishing attacks

“We are seeing some phishing attempts offering loans, or pretending to be founders to financial teams,” said Grant Warnick, CEO of cybersecurity company Fletch. “We are expecting more fraud attempts this week as bad actors pretend to be companies impacted by this incident.”

Safer Internet Day 2023: It’s a dangerous business, going online

This year, February 7th marks the 20th Safer Internet Day – we’ve collected quotes from around the industry to answer one question: How can users stay safe online?

Exploring DRM as an Industry Standard Security Addition to File Transfers

With the rise of remote working, sharing sensitive files is now taken for granted. But embracing this collaborative approach comes with increasing concerns regarding the security of our file transfers.

Computer Security Day: How to tackle ever advancing cyber threats

When Computer Security Day was started in 1988, few could have imagined just how vital cybersecurity would become.
Cyber Protection Magazine spoke to nine industry experts, to learn about the most important cybersecurity practices.

Zero Trust in Practice – Adopting and Sustaining it in Your Real-World Environment

Zero trust is a heavily used buzzword. It inspires confidence when it’s used by cyber security and technology experts to imply a completely secure technology environment that protects people, devices and applications – all of the time.