Multifactor authentication needs to move away from one-time passwords sent via text message and embrace modern standards that prevent man-in-the-middle attacks. Plus, excessive identity challenges online lead to 20% of e-commerce transactions being abandoned, say experts at Authenticate 2022.
Reusable digital identities are the present and future of cybersecurity, says Gordon Harrison of Jumio. He explains why digital identity techniques are on course to replace existing identity proofing/identity verification tools and systems.
Japanese conglomerate Hitachi has sold its small identity-as-a-service practice to Canadian software specialist Volaris Group to drive better execution around core products. The firm found it was easy to get lost within Hitachi given the conglomerate's size and focus on electronics and engineering.
Join us for the CyberArk Impact World Tour in London and meet global and local CyberArk management as well as subject matter experts and exchange ideas with friends and colleagues from the IT security industry! You will hear more about our identity security strategy, forthcoming product announcements... and of course:...
There’s been an unintended effect from Okta’s acquisition of customer identity giant Auth0. It confused its own sales force with similar CIAM products. Salespeople quit. Okta's CEO says the company will work on better sales integration of Auth0.
We are back! In-person events are back! The Cyberark team looks forward to welcoming you at the Hyatt Regency - Long Beach for the Impact Tour on October 20th
Join us for this one-day in-person event where you will hear from CyberArk executives and industry leaders on top security initiatives. Engage with local...
CrowdStrike CEO George Kurtz says the size of the untapped opportunity around identity protection mirrors where the endpoint detection and response market was many years ago. The company saw over the last quarter a doubling of the number of customers subscribing to its identity protection module.
With its acquisition of Infiot, Netskope now carries both the networking and security technology needed to build a Secure Access Service Edge architecture following. The acquisition of Infiot's platform will allow Netskope customers to address both traditional and emerging SD-WAN use cases.
Thales plans to enter the customer identity and access management market through its purchase of an emerging European CIAM player. The French firm plans to capitalize on OneWelcome's strong product by extending its footprint beyond Europe and into North America and Asia-Pacific.
The authentication journey is evolving rapidly with no sign of slowing down. Digital transformation, that was already on the rise, has accelerated with the pandemic. With increased usage of digital resources, users including employees and consumers are demanding much better experience. InfoSec professionals are under...
A misconfigured Alibaba private cloud server has led to the leak of around 1 billion Chinese nationals' personal details. An unknown hacker, identified as "ChinaDan," posted an advertisement on a hacker forum selling 23 terabytes of data for 10 bitcoins, equivalent to about $200,000.
How does a conglomerate implement PAM across multiple companies? What are some of the challenges, and how can you overcome them? Gonz Gonzales, the CISO at JG Summit Holdings, one of the largest conglomerates in the Philippines, shares his journey of PAM implementation across companies.
Tired of keeping track of passwords? Recent announcements by major platform vendors Google, Apple and Microsoft could have passwords down for the count in the next six years, says Andrew Shikiar, executive director of the FIDO Alliance, which has been on a 10-year mission to eliminate passwords.
In this discussion, we will explore how Ping Identity and AWS helped a large financial institution provide their customers with a secure, frictionless experience while allowing them to focus on growth and digital transformation and how you can utilize the same strategies and best practices.
View this session to...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.