Where is access governance? Everywhere. This is the next step forward in the evolution of what to this point has been known as the identity and access management sector; the coming and future leader of the sector.
Dean Wiech |
15 Nov |
Read more
This week, Oracle released its Critical Patch Update for October 2016. It closes multiple vulnerabilities, so Oracle administrators will face the task of testing, verifying, and deploying dozens of patches.
Alexander Polyakov |
01 Nov |
Read more
Identity and access management (IAM) has traditionally been associated with solutions designed to manage employee access to on-premises applications and systems, but these days it’s a whole lot more.
Mark Perry |
01 Nov |
Read more
Cybersecurity is the hottest topic in the IT world at the moment, thanks to the massive DDoS attacks against Brian Krebs' "Krebs on Security" website, against French hosting provider OVH, and, most recently, against Dyn’s DNS service, all of which came from compromised IoT devices, including DVRs and security cameras.
Kimberley Parsons Trommler |
28 Oct |
Read more
As commerce continues to shift online, IT managers are finding themselves juggling two competing priorities.
Mark Perry |
14 Oct |
Read more
At Okta’s annual conference (Oktane 16) in Las Vegas, I sat down with the company’s CEO, Todd McKinnon, to get his view on the current state of information security and where he sees it heading.
Krishan Sharma |
03 Oct |
Read more
When it comes to effective identity and access management (IAM), most businesses tend to focus on achieving secure employee access to on-premise applications. Yet, as commerce increasingly shifts online, IAM for customers is becoming just as important.
Mark Perry |
28 Sep |
Read more
Gone are the days when data was confined to the data centre and we could put a virtual fence around it and protect it. Now data is everyone with multiple copies of it. This causes a massive headache for CISOs who are tasked with protecting this data from falling into the wrong hands. The question then arises, with data literally everywhere, how do we achieve this?
Ashwin Pal |
02 Aug |
Read more
Research is in progress that will make it easier to find patterns of attack by cyber-criminals, and share results with the larger community.
Brett Williams |
27 Jul |
Read more
Five years ago Mozilla launched an identity management system, Persona (originally called BrowserID).
V. Balasubramanian |
30 May |
Read more
In a combat situation, our soldiers wear and carry different types and amounts of equipment, compared to when they are on normal duties. In some high risk situations they’re expected to carry around 60 kilograms worth of kit, including their gun, ammunition, armour, helmet and boots.
Nick Race |
12 Apr |
Read more
Graham Williamson is Senior Analyst at KuppingerCole and covers the areas of Identity-as-a-Service, Dynamic Authorisation Control and Privacy. He has consulted in the Identity Management sector for 15 years and is the author of the book “Identity Management: A Primer”. Graham holds a bachelor of Applied Science degree from the University of Toronto and an MBA degree from Bond University. He has practical experience in the identity management and access control industry having completed assignments in the academic, government and large corporate industry sectors across three continents.
Graham Williamson |
30 Mar |
Read more
In its recent report, The Identity of Things (IDoT) for the Internet of Things, Gartner lays out how it believes the Internet of Things (IoT), or what is often now referred to as the Internet of Everything (IoE), cannot and will not prosper unless organisations knuckle down and come to grips with how to manage multiple identities. The report then goes on to detail how today’s identity and access management technologies cannot provide the scale or manage the complexity that IoT brings to these organisations, further complicating the problem.
Allan Foster |
10 Jul |
Read more
Though it may not be widely recognised amidst all the noise around technology trends like cloud computing, mobile, and the Internet of Things (IoT), identity is a fundamental requirement to future digital growth. Without a scalable and repeatable identity strategy, businesses and organisations will not be able to properly take advantage of mobile, cloud, or IoT. A proper identity strategy allows them to identify and engage with their customers in a meaningful way — whether it be through a laptop, mobile phone, tablet, connected car, healthcare wearable, connected home device, or the next great connected innovation.
Sumal Karunanayake |
10 Jul |
Read more
Digital information is the heart of today’s organisations. It’s growing exponentially, and its effective use and management is directly linked to the continued success of the modern enterprise. However, digital technologies and global interconnection have introduced a significant number of new risks and greatly amplified existing ones. There are now many significant, high-profile examples of information risks being realised, and their impacts continue to grow. Organisations simply must improve their management of information risk.
Steve Durbin |
30 Mar |
Read more
In an environment of unrelenting attacks, network packet capture and security analytics are essential for discovering the attack while it is in progress and to provide the intelligence to minimise the damage done as well as to prevent future attacks.
Scott Crane |
24 Mar |
Read more
DDoS attacks are continuing to evolve and the last 12 months has seen huge growth in the number and size of the attacks going on in Australia. When we couple this with businesses’ increasing reliance on Internet connectivity, for either revenue or access to cloud based data and applications; protection from the DDoS threat should be a top priority.
Nick Race |
09 Mar |
Read more
The recent article by Cristian Florian, Most vulnerable operating systems and applications in 2014', was a huge hit, generating hundreds of comments and often heated debates and criticism. His analysis was also picked up by leading tech publications, generating even more chatter. What stood out is that IT professionals are really passionate about their favourite platform. This is a huge positive in the IT world as it helps a platform evolve beyond the efforts of its official maintainers and the results benefit everyone.
Emmanuel Carabott |
09 Mar |
Read more
Major web browsers and many web sites rely on the Secure Sockets Layer (SSL) protocol, which encrypts confidential information, such as credit card numbers, before sending them securely over the internet. SSL encryption ensures that email, e-commerce, voice-over-IP, online banking, remote health and countless other services are kept secure.
Ananda Rajagopal |
03 Mar |
Read more
We live in an application world. From shopping to communicating with friends, reading the news, following our favourite sports teams to listening to music – we do it through apps. With so many interactions and transactions now taking place via apps, maintaining security is becoming a big concern.
Matt Miller |
20 Feb |
Read more