ComputerWeekly.com Research Library

Powered by Bitpipe.com

Authentication Research

  • Phishing Attacks Advanced Techniques That Evade Detection

    Sponsored by: Vade Secure

    The advancement of the phishing attack has left organizations looking for ways to identify the growing number of unique phishing URLs sent to their email servers. From spoofing addresses to exploiting credentials, these attacks grow more complex yearly. Don’t get left behind – read this comprehensive guide on phishing.

  • Why Privileged Access Management Needs to Be Part of Your Virtualization Strategy

    Sponsored by: Tehama

    As organizations rely more on remote capabilities for ensuring productivity during the new normal, cybercriminals have shifted their tactics to focus on this lucrative new vector. This article highlights emerging cyberthreat tactics and overviews the benefits of incorporating privileged access management (PAM) into virtualization strategies.

  • Credential Stuffing 2020: Attack Tools and Trends

    Sponsored by: F5 Networks

    Recently emerging as one of the most prominent threats targeting web applications, credential stuffing has found its way into news headlines and mainstream media. This webinar provides an overview of the current credential stuffing trends and tactics – highlighting how the threat has evolved over the years.

  • The key implementation considerations for successful customer identity management

    Sponsored by: Okta

    In theory, effective identity and access management (IAM) is about knowing who needs access to what data, when. However, in practice, this can be more challenging than it sounds – especially when considering internal changes and new business partners. Watch this video to discover how to implement effective IAM.

  • Improving Online Customer Experience with Identity Management

    Sponsored by: Okta

    Does the adoption of identity and access management (IAM) affect organizations and users differently? In this video, join 2 distinguished security experts as they overview the affect that IAM can – and will – have on users across digital interactions.

  • Privileged Access Management to Prevent a Ransomware Attack

    Sponsored by: Hitachi Vantara

    The victims of 2020’s 11 most devastating ransomware attacks have paid a massive sum of $144.2 million in their recovery efforts. In this article, discover how privileged access management (PAM) can be implemented to proactively reduce the threat of ransomware.

  • Getting Customer IAM Right

    Sponsored by: Ping Identity Corporation

    For organizations that interact directly with end-users, customer IAM (CIAM) has been a growing necessity for several years. Regardless of the name, CIAM is vastly different from employee IAM, both in terms of approach and end goals. This white paper highlights the differences between the two and offers tips for getting started with CIAM.

  • What Every Security Professional Should Know About Third-Party OAuth Apps

    Sponsored by: Proofpoint

    For CISOs, permitting third-party apps is a constant struggle, especially given the expansive use of cloud applications. What’s important is that security professionals in authentication are up to speed on what keeps a cloud account safe from OAuth attacks. Take a look at this FAQ/checklist to be informed on the risks of third-party apps.

  • Pragmatic Zero Trust

    Sponsored by: Capgemini

    There is no consistent view of what ‘zero trust’ means in practice, particularly now that vendor marketing teams have the term firmly within their sights and intend to label everything ‘zero trust’ as a result. Read this short blog post to cut through the marketing hype and learn the history, nature, and possible future of ‘zero trust.’

  • Technology Supporting People

    Sponsored by: Advizex

    In this case study, discover the results of a healthcare provider’s recent project designed to quantify and better understand the issues they were facing surrounding identity and access management. Read on to discover what led to this project and the outcomes of their partnership with Advizex.

  • Strong Customer Authentication (SCA)

    Sponsored by: Vonage

    In recent years, Europe has ramped up on regulations concerning payment services and payment authentication. Legislation requires payment service providers (PSPs) to deliver strong customer authentication (SCA). Jump into this white paper to learn how to remain compliant without compromise.

  • Shifting Pam Into High Gear with Zero Standing Privilege

    Sponsored by: Remediant

    Since zero standing privilege was introduced in 2019, it’s considered as a strong addition to privileged access management (PAM). As it happens, admin credentials change over time, and older PAM approaches may not be enough to handle today’s modern threats. Watch this webcast to examine how zero standing access can have a positive effect.

  • SMBs Need Improved Defenses to Protect Remote Workers

    Sponsored by: Citrix

    Regardless of the outcome of this pandemic, it’s beginning to look like remote work will continue for the foreseeable future – especially among SMBs. In this webinar, explore the increasing risks and opportunities as they relate to securing remote workforces at SMBs, and discover how Citrix’s zero trust platform can help.

  • Remediant Secure One Solutions Brief

    Sponsored by: Remediant

    In order to address the growing threat of cyberattacks caused by access mismanagement, Remediant created the zero-standing privilege model to help organizations enhance their identity and access management programs. But what is zero-standing privilege & how does it work? Read this solution brief to find out.

  • Securing Remote Privileged Access Using Cloud Workspaces and Secure Perimeters

    Sponsored by: Tehama

    Leveraging a global workforce is riddled with security risks, risks that virtual desktop infrastructure (VDI) and Desktop-as-a-Service (DaaS) do not provide sufficient protection against. The next step? View this white paper to learn the limitations of VDI and DaaS and to learn the principles of secure perimeters for cloud workspaces.

  • How to Achieve Zero Touch in a Zero Trust Environment

    Sponsored by: BlackBerry

    Implementing perimeter-based security architecture against modern threats will prove futile. Today, security must be traced back to the user, and networks must always be assumed as hostile. But doing so puts employee productivity at risk. Watch this webcast to go in-depth about zero trust and it can be balanced with functionality.

  • Cradlepoint NetCloud Work From Anywhere Solution vs. Consumer Grade Hotspots

    Sponsored by: CradlePoint

    Is your organization looking for a way to easily manage all of your devices at scale through the cloud, from anywhere? Is it important that you deploy consistent security policies to all of your routers? View this data sheet for an in-depth look at a solution that includes wireless routers with enterprise-class reliability, security and management.

  • Outbound Email Security Essentials

    Sponsored by: Zivver

    As email grows in importance as a communication tool, it becomes an increasingly attractive target for cybercriminals – and protecting inboxes becomes more critical than ever. Read this white paper to discover the essentials of email security and ensure your organization is equipped to handle today’s threats.

  • Continuously Trust Zero

    Sponsored by: IBM

    Data centers are no longer the control points they used to be, and therefore the traditional ‘perimeter’ defense is no longer as effective. As businesses shift to the cloud, DCs become increasingly distributed, and so more appointed security is required. Watch this webinar for a look at how a large company introduces a zero trust approach.

  • TOP 5 REASONS TO PRIORITIZE PRIVILEGED ACCESS MANAGEMENT

    Sponsored by: CyberArk Software, Inc

    Privileged access is the gateway to an organization’s most valuable assets and is at the core of nearly every major security breach today. However, ensuring that privileged access is secure is easier said than done. In this white paper, learn about the top 5 reasons your organization should prioritize PAM-as-a-Service.

  • Security Without Compromise

    Sponsored by: Remediant

    As a result of a mandate, a major U.S. government contractor was in search of a highly-scalable solution that could couple multi-factor authentication and dynamic privileged access – and it had to be efficient and compliant. As it turned out, they were able to get what they needed and more. Take a look at this case study to learn the specifics.

  • A Step-by-Step Guide: Achieving Zero Standing Privilege

    Sponsored by: Remediant

    Privileged access management has changed how organizations keep users in check, but as it turns out, it is not enough. 74% of breached organizations admitted that the breach was made through a privileged account. The issue is standing access. Learn about the benefits of zero standing privilege in this step-by-step guide.

  • Remove Standing Privileges Through a Just-in-Time PAM Approach

    Sponsored by: Remediant

    Privileged access carries a significant risk, and even with privileged access management (PAM) tools in place, the risk of users with standing privileges remains high. Security professionals engaged in identity management may want to implement a zero standing privileges strategy. Read this Gartner article to learn more about why this is critical.

  • DTEX and the Insider Threat Kill Chain

    Sponsored by: Dtex

    With insider threats, you must ask yourself, ‘What was the user’s intent?’, ‘What it truly an insider, or were credentials compromised?’, ‘If so, how did the credential thief get into the account?’. Preventing these attacks requires visibility and intelligence. Read this e-book for 5 steps to insider attack prevention.

  • EMA Evaluation Guide to Privileged Access Management (PAM)

    Sponsored by: Remediant

    Enterprise Management Associates (EMA) reports that 76% of organizations experience privileged access policy violations each year despite 79% reporting that privileged access management (PAM) is ‘very important’ or ‘critical’ to their operations. Want to learn more? Read the EMA’s evaluation guide to PAM to discover other important trends.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.