IT and security leaders must elevate IAM out of the realm of IT, via a programme management approach, so it becomes a business-wide initiative; IAM leaders need to assert themselves in digital transformation initiatives.
The essence of IAM (identity and access management) is ensuring that the right people, have the right access, to the right resources, in the right ways, and that you can prove all those "rights" to the people that need to know.
73 per cent of fraud professionals think mobile devices will be the primary identity verification technology in the coming years. Yet 60 per cent also said that this will be biggest single point of compromise as well.
Todd Peterson warns that if we are told the intruder is already inside, then identity and access management can minimise impact as identity analytics provides insight into potential risk before anything bad can happen.
Lee Painter says a rise in security breaches due to abuse of access has put the spotlight on Identity and Access Management. So how might Artificial Intelligence shape its future?
OneLogin has confirmed that a bug has allowed a hacker to view some of its customers' encrypted Secure Notes.
Biometrics can actually weaken authentication security if not implemented correctly says Hitoshi Kokumai, who asks, what exactly does the NIST Authentication Guideline have to say on this issue?
Microsoft clamps down on easy-passwords in the wake of LinkedIn double breach.
In this video, we talk identity and access management (IAM) strategies with David Meyer, VP of product at OneLogin.
What are organisations doing wrong when it comes to dealing with the insider threat? That was the topic of conversation when we sat down recently with Mark McClain.
If 2015 is anything to benchmark against when it comes to data breaches, then 2016 should be the year that businesses button down against the escalating issue of ID and access management says Paul Trulove.