How can Facial Recognition Technology Serve Humans?
Enterprisesecuritymag >> news

Technologies certainly stand in a better position to match an image with a person, as it is time-consuming and difficult for staff. FREMONT, CA: Customs and border protection (CBP) insiders have a hard time accepting advances in the...

Do Enterprises Need a Stronger Authentication System?
Enterprisesecuritymag >> news

Biometric technology is considered as a comprehensive development in the pages of identity management, with more advantages that are making it one of the most desirables in the industry. FREMONT, CA: With advancing tech innovations, the threat...

Facial Recognition: A Boon or a Curse for Citizen Identity?
Enterprisesecuritymag >> news

For daily commercial applications, including law authorization and surveillance, there is a necessity for greater security, which can be adequately solved by confirmation alongside liveness detection.  FREMONT, CA: Introduced in the...

Can the Evolving Security Tech Strengthen Businesses?
Enterprisesecuritymag >> news

The possibilities of criminal invasions are much higher when it comes to small and mid-size companies, but fortunately, they have given it a tough fight. FREMONT, CA: In the rapidly evolving world, as soon as the cybersecurity experts introduce...

4 significant trends CIOs should know before integrating IAM
Enterprisesecuritymag >> news

Identity and access management (IAM) is changing to address the issues of the current digital era. FREMONT, CA: With software organizations dispersed globally, the end-clients of their product items can be from various geological zones. This...

Why Should Organizations Switch to Multi-Factor Authentication?
Enterprisesecuritymag >> news

IT administrators need to make sure that every new update affects the access to critical programs in the least possible way because a streamlined authentication process can keep productivity high. FREMONT, CA: In recent times, most of the IT...

How AI will Defeat Facial Authentication and Security Software
Enterprisesecuritymag >> news

AI, with its continuous evolution, will soon transform the security measures and software across almost all technologies and industries. FREMONT, CA: Anticipating the coming wave of AI-powered cyberattacks, enterprises need a shift in AI-based...

The Critical Future of Identity and Access Management
Enterprisesecuritymag >> cxoinsights

Joseph Carson, Head of Global Strategic Alliances, Thycotic

The traditional security perimeter is proving that it is no longer an effective cyber security control and fast growing technologies like Cloud, Mobile and Virtualization make the boundaries of an organization blurry. For many years organizations...

Top 5 Steps CIOs Should Execute to Upgrade On-Premises IAM Environment
Enterprisesecuritymag >> news

Every enterprise should consider a few parameters before moving IAM to the cloud. The steps given below help organizations to observe their data and secure it keenly. FREMONT, CA: With the evolving on-premises identity and access management...

Not Your Father's Identity and Access Management
Enterprisesecuritymag >> cxoinsights

Martin Ingram, Product Owner, Identity and Access management, Royal Bank of Scotland (RBS) [LON: RBS]

It used to be easy to define the boundaries of Identity and Access Management (IAM)–its purpose was to prevent anyone getting to anything that they weren’t supposed to. While that is still true it fails to recognize the world that is...

Balance between Opposite Forces / The Pursue for Trust
Enterprisesecuritymag >> cxoinsights

Paulo Moniz, Director - Information Security and IT Risk, EDP

What does it take to be a Security Manager? In this article, based on my last 10-year experience as CISO at an energy utility company, I will share my reflection on what are the keystones that can make you dare to succeed in managing a cyber...

Beyond the Traditional User Accounts Management
Enterprisesecuritymag >> cxoinsights

Arun Raghavendra, Head of IAM Technology, Visa [NYSE: V]

Traditionally, Identity and Access Management (IAM) involves managing Joiners, Movers, Leavers (JML) processes, user access reviews, standard user and privileged accounts management. "Active Directory accounts that have not been used in...

Creating a Digital ID Ecosystem
Enterprisesecuritymag >> cxoinsights

Hugo Rousseau, Programme Manager, Financial Services & Payments, techUK

Technology has changed our lives and not a day passes without a report or news headline on their combined impact. Recent developments have rightly put these at the heart of public policy debates. "It is crucial that the issue of digital...

Identity X.0
Enterprisesecuritymag >> cxoinsights

Chema Alonso, Chief Data Officer, Telefónica

Identity is intrinsic for humanity because of our need to differentiate ourselves from those with whom we relate. Nature helps us in this purpose as it provides different physical traits to the millions of people that allow us in achieving this...

'Out of the box' Secure Connectivity for eSIM IoT Devices
Enterprisesecuritymag >> cioviewpoint

Nuno Teodoro, Chief Information Security Officer, TRUPHONE

The Internet of Things (IoT) is no longer a trend, a hype, nor a utopic technological goal that the world will see in the future. The IoT is now a reality that places ubiquitous connectivity not only in the traditional phones and laptops, but in...

Why Identity Management is Important to Stop Cyber Pablo Escobar
Enterprisesecuritymag >> cxoinsights

Ben Bulpett, EMEA Identity Platform Director, SailPoint

The notorious Pablo Escobar controlled 80 percent of the global cocaine market in the early 1990s. From these illegal dalliances, in 1989 Pablo was listed as the seventh-richest man in the world, and if he were alive today, he would be worth $20B,...

Enterprise Security for IDIoTs
Enterprisesecuritymag >> cxoinsights

Lishoy Francis, Senior Consultant, Consult Hyperion

About 15 years ago, we built a robot to automate the some of the testing we do in-house. We called the robot “Roger” and thought nothing more of it. The idea of people and robots being somehow interchangeable in the workplace has since...

The Continuing Evolution of Identity and Access Management
Enterprisesecuritymag >> cxoinsights

David Lello, CISO, Burning Tree

In recent years, the cybersecurity industry has seen rapid advancements in technological developments such as the Internet of Things (IoT), Machine Learning (ML), Artificial Intelligence (AI), the Cloud, and big data – which have all had a...

Technologies Transforming the Identity and Access Management Market
Enterprisesecuritymag >> news

FREMONT, CA: With software organizations distributed worldwide irrespective of the boundaries, the end-users of their software products can possibly be from different geographical areas. This action of gaining access by various parties or users is...

Identity and Access Management is the New Perimeter and Artificial Intelligence is the New Sentinel.
Enterprisesecuritymag >> cxoinsights

Diane Joyce, Identity Management Consultant/Enterprise and Solution Architect/Information Architect, Matakite

Ten years ago, organisations were protected by the ‘fortress’, it was an era of locked down data centres and computing devices. Access to data and services required a person to have access to the right computing device, regardless of...