Five predictions for IdaaS and Identity Management in 2015
Five years ago we knew changes in technology and the ways in which we do business would present enormous challenges for how IT manages identity, what we didn’t know, was just how fast these changes...
View ArticleBox's Box Trust and Box EMM offer better BYOD security
Organizations may tolerate, accept or embrace BYOD--letting employees use their own mobile devices for business purposes--but they all struggle with the blurred line of protecting company data without...
View ArticleIdentity management at the heart of REA Group's 98% cloud commitment
Changes to security exposure, driven by shifting organisational network boundaries, have driven a resurgence in identity and access management (IAM) that has the government committing to significant...
View ArticleAs IAM demand builds, tight identity integration will secure enterprises’...
Increasing integration of identity-management frameworks at the API level will push human error out of the security equation and produce a cloud-security foundation that is “many times more secure than...
View ArticleCentralised app authentication boosting business cloud use: Okta survey
Use of security questions to verify users' identities declined throughout 2015 as SMS authentication grew, according to an audit of cloud-application usage that also revealed small businesses were as...
View ArticleMicrosoft’s leash on shadow IT is open to all and now supports Google Apps
Microsoft toolset for monitoring corporate data in third-party cloud apps is now available for all customers.
View ArticleKrebs warns of cyber criminal mind shift
Renowned investigative journalist Brian Krebs of Krebs on Security warns that cyber criminals are changing tact in how they go about their work and seek gains for their exploits.
View ArticleAn interview with Okta CEO Todd McKinnon
At Okta’s annual conference (Oktane 16) in Las Vegas, I sat down with the company’s CEO, Todd McKinnon, to get his view on the current state of information security and where he sees it heading.
View ArticleCSOs need to be more introspective about their business
The CSO of identity management vendor, Okta, says that security professionals need to do a better job in understanding their organisation’s wider business before presenting their risk assessment to...
View ArticleOffice 365 Deployment: Do you have what it takes?
The Microsoft Office 365 offering is popular with organisations of all sizes. However, many people remain unaware of its ramifications on corporate networks.
View ArticleBusinesses must rework identity infrastructure as data moves to the cloud:...
Burgeoning adoption of cloud-based solutions has pushed issues of identity management front and centre for Australian companies as they work to modernise their application infrastructure, the chief...
View ArticleIdentity in the blockchain era –beyond the hype
Blockchain, the digital ledger technology behind cryptocurrencies, such as Bitcoin and Ethereum, was initially made popular on the dark web for its security and anonymity that facilitated the sale of...
View ArticleWhere do privacy boundaries lie in the age of government interception?
Today, the boundaries of our personal privacy are constantly challenged. The same communication channels we use for e-commerce, open communication and freedom of speech are also used by criminals who...
View ArticleRemember to Consider SaaS in Your Cybersecurity Plan
Businesses around the world have quickly embraced cloud technology as a critical solution to tackle operational complexities.
View ArticleRethinking trust and the security perimeter
The modern workplace has undergone a massive transformation over the last few decades. In a time of boundless connectivity, security management now extends beyond on-premises infrastructure and...
View Article