#FIC2019 - Plénière 1 : Approche "By-design" : un concept à (ré)inventer

FIC 2019 – Protecting IS attacks starts with Secure Access Management

Nearly 10,000 people were present in Lille, in Northern France, on January 22 and 23 to participate in the FIC (International Cybersecurity Forum). This meeting brings together the main French and European ...

Has Technology Improved or Destroyed Business Security?

Technology has tremendously affected how businesses operate. There is no denying the fact that these modern advancements provide substantial benefits that enabled even the smallest enterprises to compete on a global scale ...
JumpCloud

The Art of Digital Identity

Identity and access management (IAM) is a discipline within cybersecurity that seeks to ensure that only the right people can access the appropriate data and resources, at the right times and for ...
Security Boulevard
12 Steps to Zero Trust Success

12 Steps to Zero Trust Success

A Google search for “zero trust” returns ~ 195Million results. Pretty sure some are not necessarily related to access management and cyber security, but a few probably are. Zero Trust was a ...
Reddit Breach Takeaways: MFA and Access Management

Reddit Breach Takeaways: MFA and Access Management

Reddit has been hacked! Their SMS based authentication was not strong enough to prevent a breach, so they will be moving towards token-based two-factor authentication (2FA)—will that be enough? Discover how a ...

How to Build a Better-Integrated Identity Strategy

Still taking a siloed, binary approach to identity governance and access control? It?s time to make the shift to a more holistic, integrated approach that makes it easier to respond effectively to ...

Multi-Factor Authentication Made Simple for Legacy and Custom Apps

Looking for an easier way to add multi-factor authentication (MFA) to legacy and custom applications? Look to a next-generation firewall and MFA integration to enforce it at the network layer ...
Consider Access Management

Considering Access Management – PART #4

In this series about considering access management, we've explored ideas around why organizations are adopting IAM solutions, what applications need to be protected and what users need to have access. In this ...
Access Management Lock

Considering Access Management – PART #3

We've explored why organizations are considering implementing identity and access management solutions (IAM). The solution should not only consider WHO and WHAT needs to be protected; read on to find out why ...
Access Management Matrix

Considering Access Management – PART #2

When looking at IAM solutions it is important to consider WHO needs to validated and WHAT needs to have access controls around it. The most comprehensive IAM solutions that are offered help ...