Episoder
-
Cyberattacks took the spotlight in 2021, constantly highlighting the weaknesses in current defenses and the need to improve and evolve cybersecurity strategies, but what will 2022 bring to the cyber space? To paint a better picture, we've teamed up with IT professionals across various industries to get their opinions on what to expect this year and how to secure digital experiences and prepare your organization for new cyber challenges moving forward. We talk about ransomware-as-a-business, zero trust adoption, Log4j aftermath, and many more hot topics.
-
Cybersecurity is something your users don't always like. With cybersecurity being a requirement for all organizations in the wake of growing cyberattacks, organizations need to implement stronger security policies. However, we know stronger security policies tend to make this process frustrating for your users, so how do organizations get more of their users involved and improve user adoption? How can organizations smooth out the experience and still improve security. Listen to this episode of IAM Pulse and find out. Visit our website: www.bio-key.com
-
Mangler du episoder?
-
In this episode of IAM Pulse, we review ransomware and unfortunately, the first ransomware-caused death. How does ransomware affect critical infrastructure and does this upcoming lawsuit against Springhill Medical Center change anything notable in cybersecurity? We talk all about this.
-
On this episode of IAM Pulse, BIO-key's SVP of Strategy and Compliance and Chief Legal Officer, Jim Sullivan, talks to us about Identity Bound Biometrics. What is IBB, and how does IBB differ from traditional device-based biometrics? When should organizations utilize IBB? Listen to the answers here.
-
On this bonus episode of IAM Pulse, we talk about the issues we see with traditional authentication methods.
-
On this episode of IAM Pulse, our VP of Product, Kimberly Johnson is featured on the QSights Podcast to talk about MFA. Kimberly informs on the importance of investing in multi-factor authentication (MFA) across company devices, how to go about implementing the technology, and why some companies may be resistant towards the security measure. We also discuss some of the recent, large-scale U.S. cyberattacks and how MFA can help protect against these crimes.
-
While multi-factor authentication (MFA) is at the top of many counties' cybersecurity priorities, implementing MFA is not straightforward. MFA can be overwhelming when counties have to consider selecting the right authentication methods to not only keep their county secure but also make sure employees, suppliers and citizens have a good user experience. On this episode of IAM Pulse, we are joined by county CIOs to discuss how to best implement MFA and what county officials should be looking for in an MFA solution to improve user adoption.
-
In 2020, many community banks obtained more assets, customers, and liquidity, making them a prime target for cyber-attacks, especially during the COVID-19 pandemic. As a response, banks resorted to multi-factor authentication (MFA), but choosing the wrong MFA solution can result in big dividends. Regardless, community banks can be improving their cybersecurity measures, and for implementing MFA, traditional methods are starting to fail, meaning a migration to more modern MFA methods. What if you could cut your MFA costs in half, while providing effortless user experiences for online banking and work-from-anywhere authentication? In this episode of IAM Pulse, we talk about just that.
-
On behalf of BIO-Key International, Osterman Research conducted an in-depth survey of mid-sized and large organizations on the state of MFA and related issues during May 2021. The survey uncovered how organizations are managing security and authentication, and attitudes toward various authentication methods including Zero Trust, passwordless approaches, and biometrics. In this episode of IAM Pulse, we are going to discuss the implications of the survey findings and the role that MFA plays in any IAM solution to enable greater security and efficiency for controlling access to applications and resources.
-
On this shorter episode of IAM Pulse, we'll present a knowledge-based bite on the Education side of Cybersecurity. Today, we’re talking about Designing and Implementing a Secure, Fully Brandable Web Portal. As more users are going remote, organizations should be looking to improve the users’ digital experience. The topic also revolves around the digital environment that many students and faculty are being more involved in with the pandemic and online classes being more common or preferable to some. Questions like "What is a Portal?", "How can I properly secure it?", and "Which portal is best for my organization?" are ones we will discuss today.
-
Contextual authentication also known as risk-based or adaptive authentication attempts to strike the perfect balance between security and convenience. The concept is simple - enforce the appropriate level of authentication for a specific user under specific circumstances. In this episode of IAM Pulse, we discuss the best practices for setting up a strong rule hierarchy to make Contextual Authentication work for you.
-
Traditional authentication methods are inconvenient, open to cyberattacks, expensive, and still can't verify "you are who you say you are". It's time for a different way to authenticate, but recent breaches show that passwords, OTPs, and hardware tokens are no longer reliable. Biometrics have become a preferred option for passwordless, but not all biometrics are created equal, so in this episode of IAM Pulse, we talk about BIO-key MobileAuth and how Palm Positive aims to change how authentication should be.
-
Most organizations are running hundreds, if not thousands of applications, with some running the critical operations of the business. This is the case with Oracle PeopleSoft, which runs inventory, financial services, and campus solutions for universities, colleges, and other institutions. However, when it comes to securing this application, it can be complicated and break the mold of a company's IAM strategy. This episode of IAM Pulse, we talk about how to involve PeopleSoft with your IAM strategy.
-
On this episode of IAM Pulse, we are joined by Kushan Fonseca from Neumann University discussing the cybersecurity in education perspective at Neumann University. We talk cybersecurity awareness for the staff, the students, and the challenges of cybersecurity in education.
-
On this episode of IAM Pulse, we are joined by Michael Sampson, Senior Analyst from Ostermann Research discussing the whitepaper he produced with a sponsorship from BIO-key called, Cybersecurity in Education. We talk about why the education sector is under a plethora of cyber attacks targeting it and the cybersecurity solutions that should be considered to prevent them.
-
What is Out of Band Authentication (OOB)? Is it different from MFA, and why is it essential? In this episode of IAM Pulse, we discuss what Out of Band Authentication is, which authentication methods are available to implement it and the pros and cons of them. How can your organization implement OOB Authentication properly? Listen to this episode and hear more.
-
While multi-factor authentication has become one of the best defenses for organizations to protect against cyberattacks, if it's not properly implemented & configured it can create frustration for your users. In this episode of IAM Pulse, we discuss how to deploy multi-factor authentication in a smooth way, making it easier for your users to adopt new security measures without causing frustration or security workarounds.