Identity and access management (IAM) has been a fundamental security touchstone for as long as information security has been around. Unfortunately, it is not good enough anymore.
Check out this AMA video podcast episode, where Joel Dunning, Partner and Government Planning Group Leader at Wold Architects and Engineers, talks security buy-in; overt vs. covert security; and more.
Cruise passengers debarking at the Port of San Francisco can have their identity verified via facial biometrics operated by the Department of Homeland Security.
"The Horizons of Identity" report from SailPoint Technologies Holdings, Inc. surveyed around 300 global cybersecurity executives about the state of identity management.
For security directors, implementing security technologies can be scary. Here's a simple framework you can use to build and layer security technology tools.