In a world where our digital accounts, our digital identities, get stolen by the second, we should protect them from attackers. Follow me through this lightning talk on why you should take care of your digital identities and how to protect them.
Category: Cybersecurity
Great Expectations: Solving The Pain Points Of Managing User Identities
When it comes to managing user identities and logging into IT systems, different stakeholders have different expectations. For starters, employees focus on usability and how to minimize the interruption of their workflow. The IT department, for obvious reasons, is focused on security and manageability, and management always keeps an eye on the bottom line.Balancing employees’…
NACD: Three Action Items to Get Started with Better Cybersecurity Oversight
Boards often delegate oversight of the cybersecurity strategy to executives, outside consultants, or at most one board member. It is possible to take your oversight to the next level with a few simple changes.
The Hidden Costs of Logging In
My workday probably starts the same way as most people’s. Yet, logging in over and over comes with a hefty hidden cost in terms of time, money, and security.
Protecting The Moat: Why User IDs Should Be A Top Concern For Management
Identity and intellectual property theft are rising globally, and many companies are taking new steps to mitigate the problem. With state and criminal actors pushing the issue to new heights, it’s time to move digital identity and access from something the IT department deals with to an urgent topic that belongs on the agenda of…
Why You Should Approach IT Like Rocket Science: Five Things To Learn From Satellite Companies
It’s getting crowded in the skies. Companies are busy launching small satellites into low-earth orbit on a weekly schedule. SpaceX alone had more than 1,800 birds in low Earth orbit at the end of November 2021, and experts from Euroconsult estimate that nearly 17,000 satellites will be launched over the coming decade. Most of them…
The Cost Of Logging In
My workday probably starts the same way as for most people. I turn on my computer and enter the first password. Dozens of programs and websites open by themselves and half of them demand a password. During the day, I occasionally go to more websites and programs and sometimes must log in there, too. This…
5 Things You Need To Know To Optimize Your Company’s Approach to Data Privacy and Cybersecurity
Over the last few years, we have seen a change in the perception of big tech companies and proprietary software. It used to be that IT professionals thought they could trust the big names in tech and use their products without second-guessing whether they have their customers’ best interests at heart. However, with the maturing…
Cloud Data With A Chance Of Pitfalls
In the age of cloud computing, IT seems extremely simple. With a few clicks, you acquire a new service for the company and start to feed it the data needed to be more productive. Your digital identities, contacts and all types of files are readily available from wherever you are. However, that convenience comes with…
Staying Out Of Terrestrial Trouble
How Satellite Companies Can Take Effective Steps On The Ground To Improve Their Data Security It was a slightly sensationalist headline that struck fear into the hearts of anyone involved in satellite communications: “How hackers could spy on satellite internet traffic with just $300 of home TV equipment.” In 2020, a cybersecurity researcher from Oxford…