Industry blog

Posted: 24 Jun 2019
jmacinnis's picture

Finding the right identity and access management (IAM) solution can be a challenge. With dozens of vendors and products in the marketplace, how do you pick the right one? The following is a guide to help you identify the unique needs, challenges and various factors in your organization to consider when selecting the perfect IAM solution and vendor to meet your security goals.

...

Continue reading >>
Posted: 20 Jun 2019
othiriondebriel's picture

If you’re a financial services organization doing business in New York State, then you need to be compliant with the New York Department of Financial Services (DFS) Cybersecurity Regulation, known as 23 NYCRR 500. All banks, financial institutions, and similar businesses must understand their responsibilities under 23 NYCRR 500, particularly for strong authentication and securing data.

... Continue reading >>
Posted: 25 Jun 2019
fjogandcoulomb's picture

Digital identity is more than a buzzword in the government business. It is almost reality. More than 10 pilot projects and a small number of live projects are currently running worldwide, mainly around digital driving licenses. But what do we mean when we talk about digital identity? Is it just a digitalized identity document that is accessible on a smart phone? This would not make it any...

Continue reading >>
Posted: 17 Jun 2019
fjogandcoulomb's picture

Today, a small number of citizens around the world are lucky enough to use digital IDs thanks to a handful of governments that have put these programs in place. For many others, digital ID is just around the corner. Nevertheless, the decision to go for a digital ID program implicates many decisions that a government must make during the process. An example of one such vital decision is where...

Continue reading >>
Posted: 06 Jun 2019
jcarpenter's picture

The simple combination of a user ID and password is no longer good enough to protect our most vulnerable information. Identity theft, data breaches, malware, and malicious actors mean that digital security must evolve to stay one step ahead of security threats.

Strong, reliable security in a modern government, non-profit, SMB, or enterprise environment isn’t just important today; it's...

Continue reading >>
Posted: 22 May 2019
ilowe's picture

What is it?

Wikipedia defines Augmented Reality (AR) as, “an interactive experience of a real-world environment where the objects that reside in the real-world are ‘augmented’ by computer-generated perceptual information, sometimes across multiple sensory modalities, including visual, auditory, haptic, somatosensory, and olfactory.”

More simply put, AR technology superimposes a...

Continue reading >>
Posted: 28 May 2019
mchandarana's picture

Business Email Compromise (BEC) is a type of phishing attack in which an attacker impersonates a high-level executive and attempts to trick an employee or customer into transferring money or sensitive data. According to the Federal Bureau of Investigation (FBI), as of 2018 this scheme has already caused $12.5 Billion in losses to companies. The FBI warned that there was a 60% increase in 2018...

Continue reading >>
Posted: 03 Jun 2019
jcarpenter's picture

What’s Keeping Healthcare Industry Executives and Stakeholders up at Night?

At the recent HealthCare Executive Group’s 30th Annual meeting, more than 100 executives from payer, provider and technology partner organizations ranked the top 10...

Continue reading >>
Posted: 16 May 2019
aletan's picture

As he waits to travel outside the EU, a man stands in the border control line to get his passport checked. He is a bit nervous, but his passport does not take any longer to get checked than the passport of the traveller before him. The border control officer takes a quick look at the security features on the polycarbonate data page and the security thread, the data is read from the MRZ and we’...

Continue reading >>
Posted: 15 May 2019
jmacinnis's picture

The oil and gas and critical infrastructure industries were the #1 targets by nation-state sponsored cyberthreat actors in 2017-18. Cyberattacks pose a significant threat causing major business disruption, downtime and loss of intellectual property. Rapid digitization of production tools across the industry can also increase the threat landscape unless properly mitigated.

...

Continue reading >>

Pages