Welcome to the Digital Identity Trust Resource Center!
Leading organizations understand that breaches have become the norm in today’s connected world. With information being everywhere and personalized experience driving the digital transformation, identity is critical. Identity is the foundation for trust. At CA Technologies, we understand how important it is to strike the right balance between enterprise data security and convenient user access. Our solutions address the requirements for IAM in the modern era.
Modern Identity and Access Management - Building Trust Without Sacrificing Security
Security probes into IoT vulnerabilities too often swerve into creepy territory. Take security researchers at Check Point who discovered they could seize control of an internet-connected LG vacuum cleaner's camera, allowing them to turn a roving robotic cleaner into a spy cam.
A new directive from the U.S. Department of Homeland Security elevates federal agencies' email security to the DMARC standard that's widely adopted by commercial email providers, including Google, Yahoo and Microsoft.
Banks that collectively own SWIFT saw their profits vanish last year as the organization increased its investments in information security, even as the interbank messaging service handled record volumes of money-moving messages.
A report on security flaws found in mainframe computers leads the latest edition of the ISMG Security Report. Also, the tale of how a hacker launched his career; insights on new EU data protection regulations.
ISMG's Fraud & Breach Prevention Summit in Bengaluru will provide expert insights on best practices for addressing emerging cyberthreats and tackle timely topics, including Aadhaar authentication, ransomware and the latest breach trends.
Mobile payments are more secure than online and card payments, says David Lott, a payments risk expert with the Retail Payments Risk Forum at the Federal Reserve Bank of Atlanta. But how customers use their mobile devices can dramatically affect transactional security.
When an employee exits, it's essential to ensure their access rights don't go with them. Too often, however, organizations fail to track who's joining, leaving or changing roles, leaving them at increased risk of malicious activity.
Enterprise security leaders largely understand the business problems posed by a lack of privileged access management. But understanding and overcoming the obstacles to deploying a successful PAM rollout? That's the real challenge, says Alex Mosher of CA Technologies.
New documents dumped online by the Shadow Brokers group have revealed apparent NSA programs designed to target SWIFT service bureaus in the Middle East as well as a slew of exploits designed to infect Windows systems, patched last month by Microsoft.
McDonald's home food delivery app in India leaked sensitive personal information relating to 2.2 million users. But the restaurant giant only addressed the insecure API after a researcher went public one month after informing McDonald's about the problem.