IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Identity Management and Access Control

RSS Feed   
Identity Management and Access Control Reports
 
Important Things You Need to Know about Storing Your Identity
sponsored by RSA Conference
WEBCAST: Where do you store your credentials? It's important to know, since technological weaknesses in credential security and misused actions within the operating system can be greatly detrimental to the storage of your credentials. In this session from RSA Conference, learn how to prevent the many technological weaknesses in credential security.
Posted: 31 Jul 2019 | Premiered: May 16, 2019

RSA Conference

NIST SP 800-171 and CUI
sponsored by TITUS
PRODUCT OVERVIEW: NIST Special Publication (SP) 800-171, Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations, requires all current U.S. Department of Defense contractors to be compliant with DFARS Part 252.204-7012. In this solution brief, learn how Titus can help contractors comply with these requirements.
Posted: 31 Jul 2019 | Published: 31 Jul 2019

TITUS

The US Department of Homeland Security's Best Practices for Office 365 Security
sponsored by Zoho
ANALYST REPORT: As more organizations adopt Office 365, it's important to know the risks involved in this transition. In this report, The Cybersecurity and Infrastructure Security Agency (CISA) discusses the cloud services configuration vulnerabilities found in surveyed organizations. The report also recommends steps to mitigate these risks and vulnerabilities.
Posted: 19 Aug 2019 | Published: 19 Aug 2019

Zoho

CyberArk Global Advanced Threat Landscape Report 2019
sponsored by CyberArk Software, Inc
ANALYST REPORT: In order to gain a better understanding of business leaders' engagement with cybersecurity as global organizations transition to true digital businesses, CyberArk conducted a survey. The survey also focuses on the practice of privileged access security. Download the report to explore key findings.
Posted: 20 Aug 2019 | Published: 31 Aug 2019

CyberArk Software, Inc

CyberArk PAS Assessment Tool
sponsored by CyberArk Software, Inc
PRODUCT OVERVIEW: The commonality in most data breaches and cyberattacks is the exploitation of privileged accounts, credentials and access keys. In this solution brief, learn how CyberArk's Privileged Access Security Assessment Tool can help you evaluate your current privileged access security risk and vulnerabilities.
Posted: 14 Jun 2019 | Published: 14 Jun 2019

CyberArk Software, Inc

How to Keep up with the Shifting Landscape of Password Attacks
sponsored by Zoho
WHITE PAPER: Hackers are evolving, and apart from implementing technology to help avoid cyberthreats, personal awareness plays a big role in defending against the mechanisms cybercriminals use to steal credentials. In this white paper, explore password theft methods used by hackers, and learn how simple tweaks can reduce the risk of a password compromise.
Posted: 15 Aug 2019 | Published: 15 Aug 2019

Zoho

Securing Transportation Infrastructure
sponsored by Cyber-Ark Software
WHITE PAPER: Privileged accounts, and the access they provide, represent the largest security vulnerabilities for transportation organizations today. In this white paper, learn how transit or infrastructure organizations can secure their privileged accounts, credentials and secrets.
Posted: 16 Jul 2019 | Published: 30 Apr 2019

Cyber-Ark Software

Independent Study Pinpoints Significant SCADA/ICS Security Risks
sponsored by Fortinet, Inc.
ANALYST REPORT: Many organizations beyond electric and water utilities have deployed SCADA/ICS as they look to automate their data collection and their equipment. However, the technologies have become high-value targets for hackers. In this research report, explore common SCADA and ICS threats and find recommendations for mitigating the risks they pose.
Posted: 09 Aug 2019 | Published: 16 Apr 2019

Fortinet, Inc.

Retail & Ecommerce: Securing Your Brand and Locking in Consumer Confidence
sponsored by Cyber-Ark Software
WHITE PAPER: The retail marketplace sector is facing a perfect storm of vulnerabilities. To address these vulnerabilities, organizations should implement an effective privileged access security strategy. In this white paper, learn how to create an action plan that can help your retail organization secure their privileged accounts and credentials.
Posted: 09 Jul 2019 | Published: 30 Apr 2019

Cyber-Ark Software

How the University of Sunderland Simplified and Enables Mobility and BYOD
sponsored by Ignition Technology Ltd
CASE STUDY: The University of Sunderland was looking for a platform that assured users are who they say they are while still being incredibly easy to use for all members of the university community. In this case study, learn how Duo allowed the university to do this while reducing the impact of cyberattacks.
Posted: 09 Jul 2019 | Published: 09 Jul 2019

Ignition Technology Ltd
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement