Mobile Search Mobile Menu

By Shawn Keve

IDaaS Underpins PCI DSS Requirement 8 Compliance – Part 3

PCI compliance matters when managing identity and access for remote third-party service providers. This is the third article in an ongoing series on PCI DSS Requirement 8 compliance. In a nutshell, PCI Requirement 8 is about identifying and authenticating all users to protect data and systems. When you can identify every user, you can control […]

By Shawn Keve

The State of Identity-as-a-Service

Navigating the fragmented identity and access management landscape. Identity and access management (IAM) tools have become increasingly fragmented, complex and unwieldy. While customers hoped vendors would create integrated product suites to simplify their work, little has changed. IAM tools are still narrowly focused, with separate products that need to be painstakingly integrated, managed and supported […]

By Shawn Keve

IDaaS Underpins PCI DSS Requirement 8 Compliance (Part 2 of 2)

This is the second article in an ongoing series on PCI DSS Requirement 8 compliance. When we see the ongoing stream of news reports on cybersecurity breaches, we understand cybersecurity is a growing concern for every business and their supporting IT organization(s).  PCI Requirement 8 for the credit card industry identifies controls for handling and […]

By Shawn Keve

IDaaS Underpins PCI DSS Requirement 8 Compliance (Part 1 of 2)

This is the first entry of an ongoing series on meeting Payment Card Industry (PCI) Data Security Standard (DSS) Requirement 8 compliance. Being prepared for regulatory compliance is critical for every company that processes credit card data.  Beyond the need to protect corporate assets and customer data, enterprises in many industries must adhere to industry […]

By Vikram Subramanian

“Identity” is the New Security Perimeter for Modern Enterprises

October is National Cybersecurity Awareness Month (NCSAM), and this year’s overarching message — Own IT. Secure IT. Protect IT.— certainly applies to our network perimeters. Enterprise security perimeters are being redefined, as perimeter-based demarcations and defenses are being dismantled by digital transformation, cloud, mobility, and IoT. These factors are creating unprecedented challenges for IT and […]

By Gaurav Ranjit

Improving Workforce Engagement in a Post M&A Environment

In the last decade, there has been an uptick in the volume of global Mergers & Acquisitions (M&A) and some of the factors attributed to this rise are as follows: the increasing value of the dollar improving economies of scale rapidly changing industries and digitalization need for expansion and diversification of the business portfolio complement […]

By Balraj Dhillon

Building a digital health framework that focuses on trust.

Healthcare organizations across North America are in the midst of a digital shift that is set to change the way care is provided. This shift will empower patients with more digital health tools and improve patient outcomes. We’re seeing an increasing number of healthcare providers move towards patient-focused applications (e.g. Natural Language Understanding (NLU) Chatbots) […]

By Shawn Keve

Zero Trust Security: Everything You Need to Know

You can’t afford to fall short with your cybersecurity. Cybercrime is on the rise. It’s thought that 33 billion data records will be compromised by cyber criminals by 2023. There were 12 billion this year. That’s a 175% rise in data breaches over the next 5 years. Oh, and cybercrime’s expected to cost $6 trillion to combat by 2021. […]

By Sean Rogers

Why digital transformations fail – it’s messy.

The year has come to a close more quickly than I would like and I find myself reflecting on the digital transformation projects I’ve been involved with over the past 12 months. This definitely was the year of digital transformation. It was everywhere – in the blogs, the IT press and on everyone’s lips. Tell […]

By Srikanth Rajan PMP, MSTM

Top 8 questions to ask before choosing your Identity and Access Management (IAM) Vendor

1. Does the vendor have the track record and scalability your organization requires?In a world where several big and small, service / product based companies are competing to get a piece of action in Identity and Access Management space, companies who have been around for a decade or so clearly have an edge in terms […]

1 2 3 4 5 6