Synthetic identity fraud is the fastest-growing financial crime in the country. By combining real and fabricated personal information, a synthetic identity is specifically designed to look and act like a valid identity - until it doesn’t, leaving financial losses and criminal activity in its wake.
In Part 3 of a three-part video series, CyberEdBoard member Andrew Abel, a cybersecurity and zero trust consultant, and Chase Cunningham, CSO at Ericom Software, describe the operational and business benefits of creating an identity strategy.
The latest edition of the ISMG Security Report discusses how Russian-speaking ransomware gangs have their eyes on a new target, offers the latest on Australia's data security reckoning and the government’s response, and outlines emerging trends in customer identity and access management.
Multifactor authentication needs to move away from one-time passwords sent via text message and embrace modern standards that prevent man-in-the-middle attacks. Plus, excessive identity challenges online lead to 20% of e-commerce transactions being abandoned, say experts at Authenticate 2022.
Over half of organizations have made changes to their cybersecurity structure over the last two years in response to this shift in business environments, but it’s barely moved the needle. The number of cyberattacks has increased, specifically through third-party vendor access, and businesses are failing to take...
Perennial leaders ForgeRock, Ping Identity and IBM, along with a surging Okta, set themselves apart from the pack of CIAM vendors in the latest report by KuppingerCole analysts. Ping Identity leapfrogged ForgeRock to capture the gold in product leadership, and IBM once again took the bronze.
ISACA's State of Digital Trust 2022 survey shows significant gaps between what enterprises are doing and what they should do to earn customer trust in digital ecosystems. While 98% of those surveyed say digital trust is important, only 12% have dedicated staff roles to digital trust.
The healthcare sector has long faced unique challenges involving identity and access management, but the novel coronavirus pandemic and various other key drivers are accentuating those issues, says Rebecca Archambault, senior director analyst at Gartner.
The U.S. Consumer Financial Protection Bureau is warning lenders they can be liable for data breaches for causing consumers "substantial injury." To avoid liability, the bureau recommends that banks implement multifactor authentication and especially Web Authentication.
Ping Identity is making a $50 million bet it can integrate cutting-edge technology into its own stack through a new in-house corporate venture fund to support identity and access management technology startups. "We want to have a nice overall corporate strategy portfolio," says Ping's Anton Papp.
Accelerated digital transformation has only complicated the identity verification challenge for enterprises. But Chuck Moore of Early Warning says behavioral analytics and anomaly detection combined can reduce both fraud and the friction that can come with traditional authentication methods.
The latest edition of the ISMG Security Report analyzes the latest cyberthreats to the energy sector as Russia's invasion of Ukraine continues. It also examines best practices for Customer Identity and Access Management and how healthcare institutions can sharpen their defense strategies.
It can be complicated to know if your organization is implementing strong access governance partially, or even at all, so our checklist is here to help.
Download the checklist to learn:
If your organization is implementing strong access governance partially, or even at all
Best practices for implementing access...
Over the years, this leading global hospitality company built a complex IT environment that included corporate machines, personal devices, kiosks, and home-grown and purchased applications—all housed in a large on-prem infrastructure. Heading into this decade, the company began adding cloud services, such as...