Regardless of AI advances, user identities are still crucial in any business. Why not rely on free services like logging in with social media. Find out more!
Category: Media Mention
Podcast: Using Open Source Linux-based Software for Identity Management
Usernames and Passwords are the cornerstones of identity management. What is the future for schools and workplaces? Find out!
Podcast: Protecting Your ML From Phishing And HackersPodcast:
ChatGPT and Pattern recognition pose new challenges to cybersecurity, passwords, and IT governance. Learn more in this week’s Adventures in Machine Learning!
Expert Panel: 15 Ways To Leverage Lessons Learned From ‘Innovation Powerhouses’
There are companies big and small that are well-known for never resting on their laurels, but always innovating and improving. Some companies, such as Apple and Google, are viewed as leaders in their respective spaces because they are consistently at the forefront of many of the world’s most important technological advancements, always impressing consumers with…
Expert Panel: Recommended Ways For Consumers To Better Protect Their Privacy Online
Many of us spend hours each day online. Find out how attaching a price to your data can help improve your privacy.
Podcast: Data Privacy Detective – Identity Management
Digital identities can be managed to increase security and minimize data breach risk. I had the pleasure of speaking to the Data Privacy Detective in his latest Podcast. Join me as we explore the questions: What is identity management? How can an automated approach help increase cyber security? What should consumers demand from companies and…
Flow And Automation Against The Glut Of IT
Today, the average business has over 187 applications, requiring users to switch context 1,200 times. How can CIOs and IT departments quickly take back control?
Expert Panel: 16 Tech-Related Risk Factors Company Executives Often OverlookExpert Pannel:
Technology is interwoven with the majority of business processes these days, and while that comes with big benefits, it also adds big risks. My answer and the contribution of 15 other members of the Forbes Technology Council: Now on Forbes!
Great Expectations: Solving The Pain Points Of Managing User Identities
When it comes to managing user identities and logging into IT systems, different stakeholders have different expectations. For starters, employees focus on usability and how to minimize the interruption of their workflow. The IT department, for obvious reasons, is focused on security and manageability, and management always keeps an eye on the bottom line.Balancing employees’…
NACD: Three Action Items to Get Started with Better Cybersecurity Oversight
Boards often delegate oversight of the cybersecurity strategy to executives, outside consultants, or at most one board member. It is possible to take your oversight to the next level with a few simple changes.