Identity and access management is more complicated when organizations rely on a cloud infrastructure, says Brandon Swafford, CISO at Waterbury, Connecticut-based Webster Bank, who describes the challenges in an interview.
Effectively managing privileged
accounts (sometimes called
superuser accounts) is becoming
more and more critical as security
and compliance emerge as
the driving forces behind most
IT initiatives. Unfortunately,
native tools and manual
practices for privileged account
management are proving to be
inadequate...
A vulnerability is only as bad as the threat exploiting it and the impact on the organization. Security and risk management leaders should rate vulnerabilities on the basis of risk in order to improve vulnerability management program effectiveness.
Gartner receives frequent inquiries from clients who are...
Identity and access management is not about compliance anymore - It's really about security, says Gartner's Felix Gaehtgens. With cloud, virtualization, DevOps and other IT trends, IAM has evolved from being a one-off project to an ongoing initiative.
Implementing an end-to-end privileged access management solution should follow a defined process to minimize costs and distractions, and speed results.
Throughout the process of selecting and deploying your privileged access management solution, keep in mind these business requirements, as they will help you sell...
Digital transformation has made it increasingly easy for consumers to switch institutions at the least provocation.
But leaders like Capital One, Guardian Life, and Goldman Sachs are embracing change and moving to the cloud. They're creating great customer experiences - and fighting churn - by integrating email into...
While support for cloud infrastructure is rapidly maturing and more vendors are adding behavior analytics and privileged task automation, pricing and licensing remain variable. Security and risk management leaders should evaluate multiple vendors with an eye on future requirements as well as costs.
Download this...
Is your privileged access management system directly addressing the problems which face your business?
Download this white paper and learn:
How privileged accounts should be used by one system to connect to other accounts used to run service programs;
Best practices for processes, policies and technology used to...
The Reserve Bank of India, the nation's central bank, is launching a number of efforts to help bolster the cybersecurity of banks. Those include encouraging banks to use access control management and install security operations centers. But critics say the measures aren't bold enough and offer other suggestions.
Today's world of cyber warfare is one of continuous zero-day attacks, targeted phishing scams and malicious insiders. Anyone trying to deal with these threats manually has already lost the game. You can't stop cyberattacks from occurring. But, you can significantly limit the damage when these inevitable attacks...
There are massive amounts of vulnerabilities that companies deal with on an ongoing basis - not everything is lost though. Organizations that use unpatched software face a race against the clock, with attackers regularly beginning to hammer new vulnerabilities just hours after new fixes or security alerts get released...
At its core, compliance for HIPAA is simply about maintaining patient privacy by ensuring your users appropriately access and use patient data. Electronic Health Record (EHR) solutions provide detail around when patient data is accessed.
The challenge, however, is the lack of visibility into what users do with...
The need to strengthen enterprise authentication is almost universally acknowledged. Security professionals are quick to
look at two-factor and multi-factor solutions to accomplish the goal. Clearly, the addition of second and third factors addresses the need. However, in the process, security professionals often...
The beauty of the cloud is that it's possible to expand capabilities like short-term capacity or long-term backups quickly and without the costly infrastructure and additional employees associated with on-premise equipment.
Unfortunately, many organizations are discovering their cloud environments are unattended...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.