
How can Facial Recognition Technology Serve Humans?
Enterprisesecuritymag >> cxoinsights
Do Enterprises Need a Stronger Authentication System?
Enterprisesecuritymag >> cxoinsights
Facial Recognition: A Boon or a Curse for Citizen Identity?
Enterprisesecuritymag >> cxoinsights
Can the Evolving Security Tech Strengthen Businesses?
Enterprisesecuritymag >> cxoinsights
4 significant trends CIOs should know before integrating IAM
Enterprisesecuritymag >> cxoinsights
Why Should Organizations Switch to Multi-Factor Authentication?
Enterprisesecuritymag >> cxoinsights
How AI will Defeat Facial Authentication and Security Software
Enterprisesecuritymag >> cioviewpoint
The Critical Future of Identity and Access Management
Enterprisesecuritymag >> cxoinsights
Joseph Carson, Head of Global Strategic Alliances, Thycotic
The traditional security perimeter is proving that it is no longer an effective cyber security control and fast growing technologies like Cloud, Mobile and Virtualization make the boundaries of an organization blurry. For many years organizations...Top 5 Steps CIOs Should Execute to Upgrade On-Premises IAM Environment
Enterprisesecuritymag >> cxoinsights
Not Your Father's Identity and Access Management
Enterprisesecuritymag >> cxoinsights
Martin Ingram, Product Owner, Identity and Access management, Royal Bank of Scotland (RBS)
It used to be easy to define the boundaries of Identity and Access Management (IAM)–its purpose was to prevent anyone getting to anything that they weren’t supposed to. While that is still true it fails to recognize the world that is...Balance between Opposite Forces / The Pursue for Trust
Enterprisesecuritymag >> cxoinsights
Paulo Moniz, Director - Information Security and IT Risk, EDP
What does it take to be a Security Manager? In this article, based on my last 10-year experience as CISO at an energy utility company, I will share my reflection on what are the keystones that can make you dare to succeed in managing a cyber...Beyond the Traditional User Accounts Management
Enterprisesecuritymag >>
Arun Raghavendra, Head of IAM Technology, Visa
Traditionally, Identity and Access Management (IAM) involves managing Joiners, Movers, Leavers (JML) processes, user access reviews, standard user and privileged accounts management. "Active Directory accounts that have not been used in...Creating a Digital ID Ecosystem
Enterprisesecuritymag >>
Hugo Rousseau, Programme Manager, Financial Services & Payments, techUK
Technology has changed our lives and not a day passes without a report or news headline on their combined impact. Recent developments have rightly put these at the heart of public policy debates. "It is crucial that the issue of digital...Identity X.0
Enterprisesecuritymag >>
Chema Alonso, Chief Data Officer, Telefónica
Identity is intrinsic for humanity because of our need to differentiate ourselves from those with whom we relate. Nature helps us in this purpose as it provides different physical traits to the millions of people that allow us in achieving this...'Out of the box' Secure Connectivity for eSIM IoT Devices
Enterprisesecuritymag >>
Nuno Teodoro, Chief Information Security Officer, TRUPHONE
The Internet of Things (IoT) is no longer a trend, a hype, nor a utopic technological goal that the world will see in the future. The IoT is now a reality that places ubiquitous connectivity not only in the traditional phones and laptops, but in...Why Identity Management is Important to Stop Cyber Pablo Escobar
Enterprisesecuritymag >>
Ben Bulpett, EMEA Identity Platform Director, SailPoint
The notorious Pablo Escobar controlled 80 percent of the global cocaine market in the early 1990s. From these illegal dalliances, in 1989 Pablo was listed as the seventh-richest man in the world, and if he were alive today, he would be worth $20B,...Enterprise Security for IDIoTs
Enterprisesecuritymag >>
Lishoy Francis, Senior Consultant, Consult Hyperion
About 15 years ago, we built a robot to automate the some of the testing we do in-house. We called the robot “Roger” and thought nothing more of it. The idea of people and robots being somehow interchangeable in the workplace has since...The Continuing Evolution of Identity and Access Management
Enterprisesecuritymag >>
David Lello, CISO, Burning Tree
In recent years, the cybersecurity industry has seen rapid advancements in technological developments such as the Internet of Things (IoT), Machine Learning (ML), Artificial Intelligence (AI), the Cloud, and big data – which have all had a...Technologies Transforming the Identity and Access Management Market
Enterprisesecuritymag >>
Identity and Access Management is the New Perimeter and Artificial Intelligence is the New Sentinel.
Enterprisesecuritymag >>
Diane Joyce, Identity Management Consultant/Enterprise and Solution Architect/Information Architect, Matakite
Ten years ago, organisations were protected by the ‘fortress’, it was an era of locked down data centres and computing devices. Access to data and services required a person to have access to the right computing device, regardless of...