Category: Blog

IAM Concept of the Week: RBAC versus ABAC

Introducing our new Concept of the Week blog series – Each week we’ll define and explain the significance of a concept in the world of Identity and Access Management. This week let’s discuss Role-Based Access Control (RBAC) and Attribute-based Access Control (ABAC) – both are popular approaches to determine who can access an organization’s

Engaging the Stakeholders of ECM

Engaging the Stakeholders of ECM Engaging the Stakeholders of ECM In today’s Digital Age, data and information are an organization’s lifeblood: What are the 3Q revenues from our best-selling product? How many workers under age 30 do we employ? How many software licenses in our IT enterprise are set to

New Phishing Wave Targets Online Banking and Digital Payment Customers

Cyren researchers are seeing a new phishing technique targeting online banking users from Wells Fargo, Chase and Capital One, along with digital payment customers from Paypal and Venmo, among others. This new wave of phishing attacks builds on previously known techniques. Phishing email attachments, for example, rely relying on email

IAM Concept of the Week: Authentication versus Authorization

Introducing our new Concept of the Week blog series – Each week we’ll define and explain the significance of a concept in the world of Identity and Access Management. This week’s post is short but involves two critical and related terms: authentication and authorization. These terms are frequently confused mainly

Resilient Network Systems Announces Series A Extension Round to Secure Connected Organizations

RESILIENT NETWORK SYSTEMS ANNOUNCES SERIES A EXTENSION ROUND TO SECURE CONNECTED ORGANIZATIONS $1.2 Million in Additional Funding Led by HRK InvestmentsFebruary 09, 2017 09:00 AM Eastern Standard Time SAN FRANCISCO–(BUSINESS WIRE)–Resilient Network Systems, the contextual access control company, today announced a Series A extension round totaling $1.2 million led by

New Cerber Ransomware-as-a-Service Causing Fresh Outbreaks

Cerber ransomware first appeared in February 2016, and according to initial reports (by SenseCy) it was offered in the form of Ransomware-as-a-Service (RaaS), where affiliates can join in order to distribute the ransomware, while the Cerber developers earn a commission from each ransom payment. Cyren is now detecting fresh outbreaks

GovTech – Adventures and Observations in IAM: Contextual Access Control Demo at DHS

Demonstrating ‘Contextual Access Control’ at the 2017 DHS S&T Urban Operational Experimentation Event by Daemon Price It’s an interesting time to be in Government Technology. Join me here every few weeks where I’ll share my observations on the latest technology happenings within the Beltway and across Government. We’ll discuss the

IAM Concept of the Week: FIDO (Fast Identity Online)

IAM Concept of the Week blog series – Each week we define and explain the significance of a concept in the world of Identity and Access Management. This week our IAM Concept of the Week deals with FIDO (Fast Identity Online), an authentication technology largely based on biometrics. FIDO is supported by

Streamlining the Serious Business of Due Diligence

Streamlining the Serious Business of Due Diligence Although the concept of “due diligence” has become widely accepted as any painstakingly detailed process of investigating and verifying the validity of a fact or situation, the phrase takes on a more profound level of meticulous research when used in the context of