Identity, Page 2

Cybersecurity takes center stage in US Presidential Debate

In the first US Presidential debate, held on the evening of September 27, 2016, one of three topics on the agenda for the candidates was “Securing America.” Debate moderator Lester Holt lead off this portion of the program with the following: “We want to start with a 21st century war happening every day in this…

Recent Breach Highlights Differences in IDaaS Approaches

As I talk to customers who are looking into leveraging cloud Identity services and are thinking about issues around how and where user data is stored and processed, I sometimes come across a customer who throws up their hands and says something like “the identity data is already in the cloud anyway –at the service…

How do you create a Zero Day vulnerability every day?

The answer is easy, don’t correctly manage the people you let into your business! I have been working in Identity and Access Management for over 10 Years, both as the leader of the Identity Services team at JP Morgan Chase and as an Identity Management Architect at RSA. I’ve had countless discussions with customers about…

RSA SecurID Access Takes Top Honours at Computerworld Hong Kong Awards 2016

Earlier this month, Computerworld Hong Kong recognised RSA’s identity assurance solution line, as a winner in its Computerworld Hong Kong Awards 2016. We’re humbled to have received such a prestigious award for the second year in a row, and encouraged as we continue to see the industry’s firm belief and support in our vision and…

Wearables leaking your passwords? We can solve that.

Recently, I wrote about  a newly published white-paper showing the power of wearable devices to help determine if users are who they claim to be, on a continuous basis. The paper describes a method, which in part relies on correlating a user’s gestures and movement on 2 devices in proximity of each other: The user’s…

Play Pokemon Go? Know the Risks and How to Mitigate Them

Unless your home has been inside of a cave for the past week, you’ve certainly heard of Pokemon Go. Scratch that. Even if you have been living inside of a cave, chances are that someone inadvertently entered in hopes of locating Pikachu. While the game has become seemingly ubiquitous, you should be cognizant of some…

GDPR Post Brexit – Are You Getting Ready?

The European General Data Protection Regulation presents the most significant change to data protection in the UK and EU since 1995.  It’s been discussed in the EU for the last four years so hopefully, they have taken that time to ensure that in practical terms it will work. It will come into force in May…

Cybersecurity’s Poverty Gap

As we pass the halfway point of 2016, the United States Presidential election process is in full swing. Candidates continue to make the case for why their worldview is in the best interests of the nation. Perhaps no other topic polarizes the candidates and receives more prominence in this context than wealth inequality. Within cybersecurity,…

RSA Via Lifecycle and Governance Named a ‘Leader’ in 2016 Forrester Wave: Identity Management and Governance Report

RSA is happy to announce that RSA Via Lifecycle and Governance has been recognized as a ‘Leader’ in The Forrester Wave™: Identity Management and Governance Q2, 2016 report!  (View and download the report here) Forrester evaluated 9 of the most significant Identity Management and Governance providers across 17 criteria, and recognized RSA Via Lifecycle and…

Beginning the Journey to Cybersecurity Maturity

RSA just released results of our second annual RSA Cybersecurity Poverty Index. We’re really excited about the results, but it may not be for the reasons you think. We’re excited because of the number of respondents (more than double the 2015 Index), the breadth of industries and governments represented, and the amount of time organizations…