Access Control

Access Control news, information, and how-to advice

security map digital encryption identity
The U.S. Capitol building in Washington

locks on binary code

Software-defined perimeter: Important initiative, ineffective name

A geeky and confusing name doesn’t communicate business, privacy, and security benefits. Instead of software-defined perimeter, I suggest ubiquitous security access services (USAS).

login password - user permissions - administrative control

Turbo-charging your single sign-on solution

A comprehensive privileged password manager fills the SSO gaps and boosts overall data security.

blue padlock in circle pixels digital security padlock

9 policies and procedures you need to know about if you’re starting a new security program

Any mature security program requires each of these infosec policies, documents and procedures.

monitoring systems

The security operations platform: automation, orchestration and more

As the security automation and orchestration market matures, features like collaboration, event & case management, plus reporting and metrics are growing in importance. Learn how burgeoning security operations platforms are finding a...

keys to access solutions closure complete

Who owns identity and access management?

Learn the best practices for integrating identity management into your business while also staying ahead of cutting edge competition.

vulnerable balance egg risk breach security

Striking a balance between customer experience, security and privacy

Everyone is a consumer with Consumer Identity and Access Management (CIAM).

steal theft hacker crime laptop firewall

Sinovel Wind Group found guilty of IP theft valued at $800 million

While American Superconductor's data logs and stores were helpful in convicting Sinovel Wind Group of IP theft, a data loss prevention strategy could have identified the thieves' activities sooner.

man looking at exit quit termination

How to ensure that giving notice doesn’t mean losing data

The employee exit process often devolves into a fire-drill for IT teams. Having a documented process and a strong relationship with HR can help your team go from reactive to proactive.

keys to access solutions rubic cube puzzle

Role-based access control is fine – who needs attribute-based access control?

The benefits in business agility and security confidence that come from role-based access control are more than worth the effort of deployment.

hacker endpoint security vulnerability cyberattack lock

How to approach a Zero Trust security model for your enterprise

Implementing a Zero Trust model to protect your enterprise's critical systems could be worth the trouble.

continuous authentication

What is access control? 5 enforcement challenges security professionals need to know

Access controls authenticate and authorize individuals to access the information they are allowed to see and use.

keys to access solutions unlock

Dynamic authorization: a solution to navigating GDPR

With less than five months until the implementation of GDPR, organizations are scrambling to comply with the strict data security standards.

hand connect binary access

Transforming secure access to take on today’s cyber threats

Last year, 81% of cyber attacks involved compromised passwords—up from 63% the previous year. How much worse can it get? Let’s not wait around to find out.

security map digital encryption identity

What is Zero Trust? A model for more effective security

The technologies that support Zero Trust are moving into the mainstream. Here's why security experts say it might be the best way to stop data breaches.

facial recognition - biometric security identification

Privacy and metrics of testing and staging environments

Why data privacy should be respected throughout testing as well as production.

4 change password

Password managers grow up, target business users

Enterprise-class password managers fill key security gaps left by single sign-on (SSO) and cloud access solutions.

futureofpcsecurity

How enterprise security transformed in 2017 and what comes next in 2018

Digital transformation and microservices made up the most impactful trends for the enterprise security industry in 2017, but what will have the biggest impact in 2018?

05 byod

3 options for securing BYOD data

The devices and security measures used throughout an organization play a significant role in enabling safe, efficient remote work. Unfortunately, it can be quite challenging to determine which devices should be granted access to...

Load More
You Might Also Like