The process of constructing a holistic policy-based identity management solution can be difficult and overly complex, especially in the sensitive hospital environment with myriad identities. However, an integrated identity ecosystem provides a unified view across both cyber and physical security system; improving the...
There is no more fundamental element in cybersecurity than identity. And in some ways, there's nothing harder to secure. Bil Harmer of SecureAuth calls identity "the last bastion" of cybersecurity, and he's eager to take it on in his new role.
Passwords are the access point to almost every system in our environment. Can they ever truly be replaced? John Bennett of LogMeIn talks about the steps necessary to create a secure, passwordless login experience.
Andre Durand has spent decades in the cybersecurity sector and had identity in his sights when he founded Ping Identity in 2002. Nearly 20 years later, the industry is embracing the notion that cybersecurity begins with secure identity.
Behavioral biometrics can play an important role in thwarting ever more sophisticated payment fraud schemes, says Robert Capps of Mastercard, who provides a fraud-fighting update.
"Identity is the new perimeter" is a common refrain. But what does it mean specifically in the healthcare context? Wes Wright, chief technology officer at Imprivata, discusses the challenge of securing digital identity in this sector.
As an IT and security professional at an SMB, you likely manage more responsibilities than ever. You may be juggling many competing priorities, from the helpdesk to network maintenance to managing user access and securing employee identities. But what exactly is an identity, and what do you need to know to maximize...
Managing today's hybrid work environment is challenging, but securing that environment is equally important - and difficult. Ultimately, you need to connect your users to the right technology at the right time, in a secure way. To know that you're giving the right people access, you first need to have a way to know...
With more people accessing more resources from more locations and devices than ever before, identity and access management is the critical starting point for any modern, Zero Trust approach to security. But for many organizations, understanding how to leverage an IAM solution as a part of their Zero Trust strategy can...
Zero Trust has become a cybersecurity marketing buzzword. But Kelsey Nelson of Okta sheds light on the realities of the Zero Trust approach, with a specific focus on the identity and access management component of the strategy.
The National Institute of Standards and Technology has released three biometric datasets to help organizations research new types of secure digital identification systems and authentication processes. NIST also released a study on facial recognition technology that raises some concerns.
The latest edition of the ISMG Security Report offers an analysis of the FBI's security and privacy warnings about smart TVs. Also featured: discussions on the security of connected medical devices and strategies for fighting synthetic identity fraud.
One key step for preparing to comply with the California Consumer Privacy Act, which goes into effect in January, is determining how best to verify the identity of users, say two leaders of the Sovrin Foundation, who discuss the key issues.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.