Sep 21, 2018 2:02:32 PM

It is your job to play strategically. Every move you make is done with research, thought, and only after a thorough risk assessment. You follow industry trends, consumer habits, and you’ve done your best to craft your online experience to satisfy. However, what if I told you just following suit is no longer enough? Satisfying the industry norm will not give you a competitive advantage in this crowded marketplace.

Read More

Jul 27, 2018 9:28:22 AM

A quick glance at headlines can tell you that the cost of cybercrime is on the rise.  But we’ve put a number to it; data breaches have risen 62% over the past five years. This could now easily set an organization back an average of $11.7 million per year, according to a joint report from Accenture and the Ponemon Institute.

Although this may sound dire now, it gets worse. Information Age predicts that these attacks will globally cost companies $6 trillion annually by 2021, becoming more profitable than the entire illegal drug trafficking industry worldwide. Despite the many advanced cybersecurity products and best practices available to businesses today, one simple fact remains: hackers fight dirty and they seem to be getting smarter by the day.

Read More

Jun 14, 2018 4:38:27 PM

Blockchain is the hottest buzzword surrounding data security for 2018. It shows promising technology, but will likely take years to realize its full potential. It’s not currently the complete solution for every problem, as many Chief Information Officers (CIOs), Chief Technology Officers (CTOs) and Chief Information Security Officers (CISOs) have been led to believe.

While it’s certainly important to secure data at rest—and we encourage you to do all you can in that regard—don’t overlook the vulnerability surrounding user identity and authentication. It doesn’t matter how secure you think your data is if the wrong person can still access it.

Let’s take a dive into blockchain technology in order to understand its strengths and weaknesses.

Read More

May 11, 2018 10:00:00 AM

You did it. You poured hours—not to mention blood, sweat, and tears—into your product and if you’re lucky, your customers are just as excited as you are.

But even though you’re doing well, maybe you’re not getting quite as many logins as you should be. People are dropping off on the sign-up page.

Aha! you think. I’ll just make login easier by using a social login. Just one click, and new customers will be signing up in droves.

After all, you remember reading that password fatigue—mental weariness from remembering all those logins--is real. You want to make things simpler for your customers so you can drive more logins.

But are social logins the answer? While their ease of use makes them appealing on a superficial level, we think the risks are increasingly greater than the ... Read More

Apr 17, 2018 4:00:00 PM

With more attention and investments being made in cybersecurity in general and specifically to Identity & Access Management (IAM), one term has made a recent comeback in cybersecurity vernacular: the Trusted Device. Trusted devices are a powerful tool in the IAM toolkit.

However, while cybersecurity vendors are very familiar with trusted devices, most businesses are not, and don’t understand how useful they can be. In this post, we’ll explain how inBay defines a trusted device in the context of Identity Assurance and Management. We believe this will help you understand how to provision and utilize trusted devices in your IAM approach.

In its simplest form, a trusted device is a computing device that you own and consider “secure.” It's something you wear, have in your pocket or carry in your bag. From an IT admin's perspective, it's a device that the ... Read More

Mar 13, 2018 3:00:00 PM

Cyberattacks and cyber-threats continue to grow in frequency and sophistication. If you are a CISO or IT professional in a mid-market or larger company where access security is imperative, here are 5 important cybersecurity threats that you must put on your focus list.

Read More

Mar 6, 2018 11:00:00 AM

If you’re a fan of The Today Show, you may have seen their segment on Wednesday, February 28th highlighting the increased danger around identity and access management. In the segment, a part of their Hacking of America series, NBC’s Tom Costello shared that your passwords may already be for sale on the internet.

Here’s the key takeaway from their story: No matter how strong you think your passwords are, security experts say they’re probably no strong enough. Here’s the segment if you haven’t seen it:

Read More

Feb 27, 2018 10:00:00 AM

The General Data Protection Regulation (GDPR) goes into effect on May 25, 2018. The GDPR is a new regulation that will require businesses to protect the personal data and privacy of European Union (EU) citizens for transactions that occur within EU member states. If your company does business in Europe, or is a company that collects data on citizens in EU countries, here’s what you need to know about GDPR.

Read More

Feb 15, 2018 11:00:00 AM

As much as we’d like them to, cybercriminals don’t stay still. They’re always working on their next greatest crime. The dynamic and fast-moving nature of cyberattacks outpaces the cybersecurity solutions designed as quick fixes. In fact, as soon as one solution is discovered, cybercriminals are already working on their next mode of attack.

This makes it difficult to keep valuable data secure. You must stay abreast of the current cybersecurity trends in order to keep informed, gain knowledge and brace yourself for the latest attack.

Here is a mix of fresh and familiar threats to watch for this year:

Read More

Jan 23, 2018 12:00:00 PM

Mistakes are the stepping stones of learning. So put on your sneakers and let’s take a stroll down memory lane of some of the biggest breaches in history.

Read More