Identity & Access — Opinions

​Security in 2020 – Data Security is Key

Gone are the days when data was confined to the data centre and we could put a virtual fence around it and protect it. Now data is everyone with multiple copies of it. This causes a massive headache for CISOs who are tasked with protecting this data from falling into the wrong hands. The question then arises, with data literally everywhere, how do we achieve this?

Ashwin Pal | 02 Aug | Read more

Is Your Enterprise Mobility Strategy Good?

There are numerous benefits to creating a mobile workforce, including improved information sharing, increased productivity and greater work flexibility. But this has left many enterprises having to manage the need to balance connecting more devices, apps and data to enable business productivity while at the same time tightly handling security and controlling cost.

Billy Ho | 27 Apr | Read more

Securing the enterprise in a brave new digital world

The security threat landscape has changed dramatically in ways unfathomable from just a few years ago. In today’s digital world where applications range in the millions, organizations need to be aware of the fact that enterprise infrastructure is not the only vulnerable spot for hackers.

Martyn Young | 27 Apr | Read more

Cyberwar Incident Response at the Speed of Thought

In a combat situation, our soldiers wear and carry different types and amounts of equipment, compared to when they are on normal duties. In some high risk situations they’re expected to carry around 60 kilograms worth of kit, including their gun, ammunition, armour, helmet and boots.

Nick Race | 12 Apr | Read more

Do you have an Insider Threat Program?

Insider threats are increasingly on our radar, we saw a recent example in Australia with an Bluescope Steel employee taking out company documents. Also two scientists at Glaxo Smith Kline research scientists in another well publicised incident- Yu Xue and Lucy Xi, were charged with stealing trade secrets.

David Gee | 01 Apr | Read more

Reminiscing about identity and access management (IAM)

Graham Williamson is Senior Analyst at KuppingerCole and covers the areas of Identity-as-a-Service, Dynamic Authorisation Control and Privacy. He has consulted in the Identity Management sector for 15 years and is the author of the book “Identity Management: A Primer”. Graham holds a bachelor of Applied Science degree from the University of Toronto and an MBA degree from Bond University. He has practical experience in the identity management and access control industry having completed assignments in the academic, government and large corporate industry sectors across three continents.

Graham Williamson | 30 Mar | Read more

Securing the Identity of Things (IDoT) for the Internet of Things

In its recent report, The Identity of Things (IDoT) for the Internet of Things, Gartner lays out how it believes the Internet of Things (IoT), or what is often now referred to as the Internet of Everything (IoE), cannot and will not prosper unless organisations knuckle down and come to grips with how to manage multiple identities. The report then goes on to detail how today’s identity and access management technologies cannot provide the scale or manage the complexity that IoT brings to these organisations, further complicating the problem.

Allan Foster | 10 Jul | Read more

Securing digital identities for the cloud era

Though it may not be widely recognised amidst all the noise around technology trends like cloud computing, mobile, and the Internet of Things (IoT), identity is a fundamental requirement to future digital growth. Without a scalable and repeatable identity strategy, businesses and organisations will not be able to properly take advantage of mobile, cloud, or IoT. A proper identity strategy allows them to identify and engage with their customers in a meaningful way — whether it be through a laptop, mobile phone, tablet, connected car, healthcare wearable, connected home device, or the next great connected innovation.

Sumal Karunanayake | 10 Jul | Read more

The Next Generation of Assessing Information Risk

Digital information is the heart of today’s organisations. It’s growing exponentially, and its effective use and management is directly linked to the continued success of the modern enterprise. However, digital technologies and global interconnection have introduced a significant number of new risks and greatly amplified existing ones. There are now many significant, high-profile examples of information risks being realised, and their impacts continue to grow. Organisations simply must improve their management of information risk.

Steve Durbin | 30 Mar | Read more

The Active International Response to Cyber Crime

The international cyber-security versus cyber-crime battle is gathering pace and what we’re seeing is the formation of international alliances to fight this rising scourge. However, the online world is unlike any other, it will take more than a defensive mindset to win this battle.

Mark Gregory | 26 Mar | Read more