CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Identity Management
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Identity Management

Man touching virtual panel with finger showing identity management
Cyber SecurityInsights

Working Together for Privacy Protection: Identity Management Best Practices for Companies and Consumers

June 29, 2021
A strong identity management strategy involves monitoring user behavior and activity, verifying user identity with strong authentication solutions and cybersecurity education and awareness.
Read More
Data processing and scanning on screen over glowing horizon showing machine identity management
Cyber SecurityInsights

Machine Identity Management Is the Real Reason Why Today’s CIOs Cannot Sleep

November 8, 2021
With the number of machines rising to vastly surpass the number of people using them, machine identity management has recently garnered attention from IT leaders all over the world, especially among organizations undergoing a digital transformation.
Read More
Young business woman in medical mask working from home showing impact of remote working on identity management
Cyber SecurityInsights

Conditional Access – How To Support Remote Working and Identity Management

January 21, 2021
Remote work has put more pressure on the technology that companies have in place. What is important heading into 2021 is that we look at what went well, what has to change, and what lessons we can learn.
Read More
Singapore city skyline at night showing digital services driving identity management
Cyber SecurityInsights

Digital Birth Certificates Could Be on Their Way to Singapore

July 8, 2021
Today, as we navigate a new future that is truly digital-first, the next innovation that could hit Singapore very soon is digital birth certificates, something that effective identity management technology can help to achieve — rendering paper birth certificates a thing of the past.
Read More
Woamn with Iris recognition technology showing KYC and identity
Cyber SecurityInsights

How To Know and Trust Your Customer: Four Tips for Financial Enterprises

October 7, 2021
With the pandemic accelerating digital transformation, there has also been a surge in fraudulent activity as threat actors are exploiting newly remote operations. In today’s digital world, knowing your customer is more critical than ever before.
Read More
Man in front of fingerprint scanner showing identity system
Cyber SecurityInsights

A Modern Identity System Can Positively Impact the Bottom Line – Here’s How

October 11, 2021
A modern identity and access management system is critical to manage access across multiple operating systems, devices, locations and applications, based on what a user should be able to do and what they will need over time.
Read More
Key lock on PC keyboard showing need for identity management
Cyber SecurityInsights

Hackers Are Targeting Remote Workers; Identity Security and Credential Management Are Essential to Keeping Your Company Safe

September 9, 2020
As the technology that supports the modern workplace expands, so do the needs for identity management and credential assurance. Rigorous identity security standards shouldn’t have to overwhelm your IT team or budget.
Read More
Opened security lock on computer printed circuit board showing identity management and machine identities
Cyber SecurityInsights

The Rise of Software “Machines” Requires a New Type of Identity Management

September 9, 2021
Attackers who are blocked by strong defenses in other areas, are exploiting exposures from mismanaged machine identities to exploit the trust these systems are designed for.
Read More

Latest

Developers typing on keyboards while writing code showing API security and cybersecurity incidents

Cybersecurity Incidents From Poor API Security Cost Businesses $75 Billion Annually

Robot toys gather around a laptop showing Russian botnet for proxy service

International Law Enforcement Partnership Takes Down Russian Botnet; Illicit Proxy Service Had Been Selling Hacked IP Addresses

Team discussing cybersecurity strategy in front of laptops

Can Your Cybersecurity Strategy Stop a Determined Attacker?

Close up of cyber criminal hacking and cyber attacks

67% Of Businesses Suffer Repeat Cyber Attacks Within 12 Months After the First Data Breach

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results