Delivering healthcare is a multifaceted process that requires mental and physical support for patients as well as their families. That's why digitally and physically transforming the security experience for patients and visitors is a critical part of the total patient care equation.
In spite of this, many...
Digitally and physically transforming the security experience for patients and visitors is a critical part of the total patient care equation.
In spite of this, many organizations continue to handle their physical identity and access management through manual processes with data housed in disparate physical...
The "zero trust" network architecture model is 10 years old - and suddenly more relevant than ever. How does John Kindervag, the creator of zero trust, feel about his "baby" today, and what advice does he give to organizations looking to adopt the model?
Enterprises long have practiced workforce identity and access management, but increasingly they are rolling out customer IAM, or CIAM. What's driving the trend, and where should cybersecurity leaders look to assert influence? Keith Casey of Okta explores some CIAM myths and realities.
One measure of the popularity of the Zoom teleconferencing software: Cybercrime forums are listing an increasing number of stolen accounts for sale, which attackers could use to "Zoom bomb" calls and push malicious files to meeting participants. Security experts describe essential defenses.
"Zero trust" could be described as the bumper sticker for cybersecurity in 2020, but what does it actually mean? In a preview of a virtual roundtable discussion, Lisa Lorenzin of Zscaler offers a clear definition and describes how to implement it in the current environment with a growing remote workforce.
A month-plus into pandemic response, what have enterprises learned from deploying and securing a nearly fully-remote workforce? Thomas Bieser of Okta shares lessons and the benefits of accessing critical apps and tools via the cloud.
What are some of the critical considerations for aligning strong security controls with the workflow needs of clinicians? Omar Khawaja, CISO of Highmark Health, which includes health plans and a healthcare delivery system, discusses key issues.
With a global remote workforce, the concept of secure identity has never been more critical. What is the present and future of identity? In a preview of an upcoming virtual roundtable discussion, SecureAuth's Bil Harmer shares his vision.
Identity and access management for the workforce? Cybersecurity leaders are all over that. But what about customer IAM? There's plenty of room to grow there, judging by Dallas roundtable discussion featuring Richard Bird of Ping Identity and Gray Mitchell of IDMWORKS.
"Passwordless authentication" is one of the hot cybersecurity topics, but who's actually implemented it - and how? Jeff Carpenter of HID Global discusses the business benefits and the future of passwordless authentication.
With the COVID-19 pandemic forcing large portions of the workforce to shift to telework, CISOs need to rethink corporate policies on the use of video conferencing platforms and other communications tools, says NIST's Jeff Greene, who offers risk mitigation advice.
The latest edition of the ISMG Security Report offers an analysis of the phases businesses will go through in the recovery from the COVID-19 pandemic, plus an assessment of new risks resulting from the work-at-home shift and lessons learned from the Equifax breach.
The California Consumer Privacy Act (CCPA), which went into effect on January 1, 2020, gives consumers the right to access, delete, or opt out their personal data.
Companies that are subject to CCPA and other U.S. State level privacy regulations should be actively prepared and should begin documenting the steps...