Search results for:
-
The First Steps in Securing Hybrid Work
As a result of the pandemic, businesses everywhere made major investments in virtual private networks (VPNs) to secure remote work. But as the Colonial Pipeline ransomware attack and the Fortinet brea
-
How abstimmen.online and SecurID Get out the Vote
In Europe, the nonprofit abstimmen.online e.V. helps nonprofits and civic organizations conduct free online elections and increase voter turnout. That’s an important service, particularly during the
-
The Team, Technology and Culture: Why Jim Taylor Joined SecurID
In September, SecurID announced the appointment of Jim Taylor as Chief Product Officer. In this Q&A, Jim discusses why he joined SecurID, the trends shaping identity product development, the role cust
-
The New Technology Powering Europe’s COVID Certificates
In just a few months, millions of people began using verifiable credentials and distributed identity as part of the European Union’s Digital COVID Certificate. But despite their rapid uptake, many i
-
Data Access Governance: Control, Access and Use Unstructured Data
Unstructured data accounts for 80% of enterprise data and will continue to grow exponentially with the continued pace of digital transformation. Gain visibility and control over sensitive unstructured
-
SecurID: More Ways for More People to Go Passwordless
Today’s users need secure, convenient authentication all the time, everywhere. SecurID is there for them with passwordless capabilities that make it easy to authenticate quickly and easily, for acce
-
Passwordless Authentication: Easy To Use and Easy To Manage
SecurID passwordless authentication is so easy to use, we can cover everything a user needs to know in just one short video. But how about what an admin needs to know? That’s easy, too—and we can
-
SecurID and FIDO Passwordless Authentication: Getting Better All the Time
SecurID and the FIDO Alliance have worked together for years to promote passwordless authentication, with SecurID giving users convenient FIDO-based ways to log into applications (on-premises and clou
-
IoT Identity Security: 4 Best Practices
Weak identity security for IoT and IIoT are fueling ransomware attacks on critical U.S. infrastructure. Use these best practices as a starting point to develop an identity governance strategy that can
-
Support and Secure Hybrid Work with Identity Governance
Join Hector Monsegur, Corporate Pen-Tester and Expert Security Researcher, Alacrinet, and Christopher Williams, SecurID Solutions Architect & Field CTO on Thursday, July 22 at 1 PM eastern for a webin