Articles about Identity Management

One in six endpoints has identity risks

identity theft hacker

Many data breaches have unmanaged, misconfigured or exposed identity details at their core. Yet despite this, businesses continue to lack visibility into their identity risk.

A new study from Illusive reveals as many as one in six enterprise endpoints it analyzed had some form of identity risk.

Continue reading

Modern mentorships: Fixing the cybersecurity skills gap

With job vacancies currently outweighing the number of people available to fill them, a career in cybersecurity offers almost limitless opportunities. The 2021 Cybersecurity Workforce Study from (ISC)² estimated that there were 4.19 million cybersecurity professionals worldwide -- an increase of more than 700,000 from the year before.

While this illustrates an industry undergoing major growth, there remains a workforce gap of 2.72 million people which represents a very serious problem for organizations faced with a growing volume and sophistication of security threats.

Continue reading

Governing the ungovernable: Why cybersecurity must adapt to identity sprawl

unknown identity

You may remember the Colonial Pipeline ransomware attack. Launched in May of last year, DarkSide’s attack cost the Colonial Pipeline Company something on the order of $4.4 million dollars (though the FBI was able to claw some of that money back). The attack set the stage for President Biden’s Executive Order on cybersecurity, shut down pipeline production, and caused panic buying across the Southeast.

That’s how the Colonial Pipeline attack ended. It began far more simply: with hackers breaching the company’s networks through a virtual private network (VPN) account that was no longer actively in use.

Continue reading

New solution helps guarantee electronic documents

Contract signing

Electronic documents are becoming more common in business, but this doesn't eliminate the risk of forgery or tampering.

UK-based Borderless Security is launching a new e-signature solution that makes use of blockchain technology to create a safe, secure and convenient solution for signing paperwork, contracts and legally binding documents.

Continue reading

Why identity management needs to be brought up to date for the cloud [Q&A]

Cloud data security

Historically identity and access management has been built around an on-premises model. But with more systems now residing in the cloud the old way of doing things isn't working.

To find out more about why the cloud needs a new approach to IAM we spoke to Britive CEO, Art Poghosyan, about the challenges it raises and how to address them.

Continue reading

Zero trust, democratization and biometrics -- identity management predictions for 2022

Crystal ball with key

Zero trust has been one of the security buzz phrases of the past year and control of identity and credentials is likely to remain a focus for businesses and consumers alike, especially as the work from home trend looks set to continue.

Here's what some of the experts think the identity field holds for us in 2022.

Continue reading

New solution aims to streamline enterprise identity management

identity management

Over time enterprises amass lots of applications, each of which has its own means of authentication and authorization for users. This inevitably leads to 'identity sprawl' with information being held in multiple different silos.

In order to unify identity data from all sources within an organization and turn it into a flexible resource that can deliver verification on demand, Radiant Logic is launching its RadiantOne Intelligent Identity Data Platform.

Continue reading

Identity fraud gets more sophisticated, pointing to organized crime involvement

Fraud

In the last year, 47 percent of all identity document fraud was classed as 'medium' sophisticated, a 57 percent increase over the previous 12 months.

A report from identity verification and authentication company Onfido says this points to organized groups attempting to create 'verified' accounts with fake documents before using them to embark on other types of fraud.

Continue reading

IT pros see zero trust as a key element of security strategy

A new survey of over 1,000 IT security professionals finds that 75 percent of organizations recognize zero trust as being important to bolstering their overall cybersecurity posture.

However, the study conducted by Dimensional Research for One Identity also shows only 14 percent have fully implemented a zero trust solution. Another 39 percent of organizations have begun to address this need, and an additional 22 percent say they plan to implement zero trust over the course of the next year.

Continue reading

UK consumers skeptical about 'common digital identity'

The idea of a 'common digital identity' (CDI), that would allow access to a range of services, offers huge benefits to financial institutions in delivering better, faster, and more reliable checks for consumers.

Consumers themselves, however, are less convinced. A survey conducted by RegTech Associates on behalf of PassFort finds only 17 percent of UK respondents say they are very much in favour of CDI.

Continue reading

Poor identity management makes it easier for cybercriminals to launch attacks

identity theft mask

New research from identity security specialist One Identity shows that 95 percent of companies report challenges managing identities.

In addition 84 percent say that the number of identities they're managing has more than doubled, which means they have too many identities and credentials to keep track of, leaving holes within their network, evidenced by only 12 percent of security professionals being fully confident they can prevent a credential-based attack.

Continue reading

Businesses have under 10 minutes to approve new accounts online

A joint study by Onfido and Okta finds that businesses have just 10 minutes to set up new digital accounts or risk losing consumer trust.

This is true across sectors, 65 percent want to open a bank account in less than 10 minutes, 69 percent to book a car rental, 72 percent to open a telemedicine account and 77 percent to register a gaming account.

Continue reading

Humans are predictable, even criminals

People’s lives are built around patterns and routines. Their routines are structured. After a while, they even become predictable.  A change in routine, an abnormality, emphasizes the pattern itself. When we add a non-routine activity to our lives -- our actions usually indicate it will occur. For example, before a vacation we make plans, buy a ticket or book a hotel. Before we move to a new house, we usually visit the location several times, make money transfers and sign a contract.

In their study from 2010, Albert-László Barabási and his team studied the mobility patterns of anonymous cell-phone users and concluded that despite the common perception that our actions are random and unpredictable, human mobility follows surprisingly regular patterns. Their research eventually concludes that people’s movement patterns are 93 percent predictable.

Continue reading

New software streamlines customer access management

As more customers use apps and online portals, businesses need to ensure that these day-to-day interactions that are both inviting and secure.

However, developers often lack the expertise to incorporate CIAM (Customer Identity and Access Management (CIAM) into their applications. WSO2 is addressing this challenge with today's introduction of its next-generation identity as a service (IDaaS) solution, Asgardeo.

Continue reading

The changing face of digital identity verification [Q&A]

As we've grown more and more reliant on the internet to carry out everyday transactions, proving who we are has become a major issue.

We are still heavily dependent on IDs, passwords and supplementary security questions, but all of these are open to abuse leading to the risk of identity theft.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

Regional iGaming Content

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.