As organizations find themselves amid cloud migration, what should they be discussing in regard to what they want to move to the cloud and how to protect identities? CyberArk's Khizar Sultan offers his vision of a migration road map and milestones.
As the lines blur between identity and privilege, there is a growing set of solutions to secure the anytime, anywhere workforce. Archit Lohokare, CyberArk’s vice president of product management, discusses passwordless authentication, zero trust and other ways enterprises are modernizing identity and access.
Joey Johnson, CISO of Premise Health, a Brentwood, Tennessee-based provider of online healthcare services, outlines a three-pillar security program in which "identity is the central aspect."
The network has become hybrid and multi-cloud, and security now needs to be harmonized across network, workload and application domains. The complexity of your disparate and dynamic environments is an enemy and you need to defend against it, as you would against any sophiscated adversary.
With more than 61% of breaches attributed to stolen passwords, a password manager can go a long way in helping enterprises enhance security, say Chandan Pani, CISO at Mindtree, and Lloyd Evans, identity lead, JAPAC, at LogMeIn.
Customer identity and access management - CIAM - has taken off over the past year. But too many of the initiatives are limited in scale, says Dennis McDermott of OpenText. He shares key CIAM components and milestones.
The Identity Theft Resource Center, a nationally recognized nonprofit organization established to support victims of identity crime, has published new research that shows nearly 30% of people who contact the ITRC are victims of more than one identity crime.
Thycotic and Centrify recently merged to create a powerful new player in the privileged access management space. Art Gilliland, CEO of the new ThycoticCentrify, discusses this combined entity and the role it can play for enterprises small and large in ensuring cloud identity security.
From identity and access management to cloud migration and connected devices, retired RSA CEO Art Coviello looks beyond the pandemic and says, "It's going to be a Roaring '20s for technology." But he also foresees a potentially calamitous decade for security.
The past year has been a milestone one for RSA and for RSA Conference alike. In this exclusive interview, RSA Group CEO Rohit Ghai discusses the changes, the state of secure identity and the role XDR will play in shaping cybersecurity's future.
Nearly a year ago, RSA's Chief Digital Officer, Zulfikar Ramzan, sat with ISMG to discuss 2021: A Cybersecurity Odyssey. Which predictions came true, and how have the threat and technology landscapes exploded in unexpected new directions?
Merger and acquisition activity involving cybersecurity companies continued at a rapid pace in the last two weeks, with Accenture, Forcepoint, OneTrust and the Swedish IT consultancy firm Knowit AB all making acquisitions.
More use cases are emerging for self-sovereign identity, which gives individuals more control over their digital identities, according to Heather Dahl and Ken Ebert of Indicio.tech.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.