RSA Blog - September 2017

  • 9/25/2017 Identity and Access in the Cloud: Keeping It Simple There’s no question cloud applications can dramatically simplify and streamline how users get the resources they need to work effectively. But do you worry about how moving to the cloud could also complicate IT, with so many more apps and more users in more places outside your control? Smooth your journey to the cloud with these key principles.
  • 9/22/2017 Making Access More Secure and More Convenient with Facial Recognition Flexible authentication is one of the keys to successful identity assurance. With its careful balance of high security and low friction for users, facial recognition technology seems poised to become an important component in any program of flexible authentication.
  • 9/19/2017 Loyalty Fraud: Are You a Sitting Target? Cybercriminals are increasingly turning to loyalty schemes as a rich source of rewards. In the wake of many high-profile data breaches, account takeover attacks targeting loyalty and rewards accounts are growing, and organizations need effective ways to combat the threat.
  • 9/19/2017 Top 5 Authentication Trends in 2017 The increased popularity of enterprise mobile applications only heightens the need for a consumer-simple experience—one that provides access control commensurate with the risk of a given transaction. MFA, SSO, authentication standards, biometrics and smartphones will each continue to play a role as the market moves toward risk-aware authentication.
  • 9/18/2017 In the Wake of Recent Breach It’s Time to Revisit Your Fraud Strategy In light of the recent mega breach, where over 143 million U.S. citizens were impacted, it is critical for organizations to pause for a moment and reflect on critical steps they must immediately focus on to align information security and fraud strategies to mitigate risk.
  • 9/12/2017 Yin and Yang: Two Views on IAM - Security vs. Convenience Debate: When looking at the identity risk vector and the constant attack level capabilities advancing every day, it may be time that we strike a balance more towards caution than convenience. Or do we find ways to balance security and convenience by leveraging risk and context to eliminate the friction that added security can create?
  • 9/12/2017 7 Steps to a GRC Risk Management Framework-7: Provide Visibility This last step in the process involves providing visibility into and reporting on risk. Remember, in creating the framework, you’re examining business processes and outcomes that can introduce risk to the organization. For business leaders to make informed decisions to manage that risk, they need easily visualized, timely information about it.
  • 9/5/2017 7 Steps to a GRC Risk Management Framework – 6: Enterprise Risks & Controls Enterprise-wide documentation is a vital step because if you want to exert control over activities that create risk—such as unauthorized persons accessing information categorized as important and at risk—you have to be able to identify those activities. And documenting information-related business processes is how you do that.