Just back from a trip to Israel, where she spoke with leading security researchers about such topics as the Internet of Things, cyberterrorism and banking malware, Gartner analyst Avivah Litan says 2016 will be a turning point for adoption of biometrics in identity proofing. Learn why in this video interview.
Application proliferation has created identity fragmentation as user identities are inconsistently managed across applications in the enterprise, increasing risk and cost. Enterprises need to ensure users have sufficient access privileges to perform their job functions, but for compliance and security reasons it's...
IT security and access management have never been greater challenges.
While the criminals get smarter, the IT environments become more complex to manage. Most are a hybrid of on-premise systems and a multitude of cloud providers transforming the act of role-based access management into a manual nightmare. To...
Today's cybercriminals are aware of the fraud prevention technologies deployed by most financial institutions, and they design attacks to circumvent these controls. Transaction anomaly detection and device ID approaches can be highly inaccurate, generating a large number of false positive alerts that can overwhelm IT...
Recent attacks have shown that once a user's endpoint is infected with advanced malware, criminals can bypass most security layers, including two-factor authentication, device ID systems, risk engines and behavioral analytic systems. Banking malware such as Citadel, Zeus, Dyre and Bugat, incorporate advanced...
What's your digital identity strategy? Numerous agencies in countries across Europe - such as the Italian postal service - are creating new approaches to verifying identities and allowing them to be used as a trusted service, says CA's Paul Briault.
The norm today is a set of customers with multiple identities that interact with your brand across many channels. With that comes the challenge of serving that customer with a fluid experience across every channel.
We're just beginning to get the customer experience right across all of the different channels we...
The Target breach was the hot topic for many RSA 2014 attendees, but Gartner's Avivah Litan was already talking about the next Target - a UK retailer that may have suffered a similar hack, exposing payment card data.
The development of authentication technologies that could replace the password is "nearing a tipping point," but there's still several years of work to do, says Jeremy Grant, who oversees the National Strategy for Trusted Identities in Cyberspace.
Private equity firm Veritas Capital will acquire BeyondTrust, a cybersecurity software company, from venture capital firm Insight Venture Partners. Financial details of the acquisition were not disclosed.
Customers increasingly use digital channels to interact with organizations. But these interactions raise new security concerns that must be addressed by IAM solutions, says David Gormley of CA Technologies.
Gemalto plans to acquire SafeNet, a data and software protection provider, for $890 million to help reinforce its identity and access management business. The deal is expected to close by year's end.
Fraud Summit - San Francisco 2014 - The hackers get the headlines, but behind the scenes the stealthy insiders continue to pose huge fraud risks to banking institutions. And often the fraudsters are senior, trusted employees with privileged access to accounts and competitive data. Register for this session to learn...
In the face of evolving threats and actors, traditional ID security strategies have been proven inadequate, says Entrust's David Rockvam. It's time for a security evolution.
Advice on how to encourage information sharing while preserving control over access to data is provided in a new special publication from the National Institute of Standards and Technology.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.