DARKReading: Securing Identities In The Cloud (Oct. 3rd)
IT News - Security

Customer Identity and Access Management (CIAM) is a comprehensive framework and set of technologies designed to manage and secure the digital identities of an organization's customers.

It encompasses the processes and tools required to collect, store, and manage customer identity information, as well as control access to digital services and resources. CIAM is distinct from traditional Identity and Access Management (IAM) systems, which primarily focus on managing the identities and access of employees within an organization.

CIAM matters significantly to enterprises for several reasons. One of the main reasons is that it enables a seamless and secure customer experience by providing a single point of authentication and authorization across various digital channels and applications. This streamlines the login process for customers, reducing friction and improving user satisfaction. Additionally, CIAM supports multiple authentication methods, including multi-factor authentication (MFA), social login, and biometrics, which enhance security while offering user-friendly options.


Cut Through Cybersecurity Vendor Hype With These 6 Tips
Search Security, Wednesday, September 6,2023
Cybersecurity vendor hype can make purchasing decisions difficult. When considering a new product or service, think critically about whether it would truly add business value.

To protect themselves against today's constant barrage of security threats, organizations turn to an ever-increasing array of products and services that promise to safeguard their systems and data.

Cybersecurity vendor hype and marketing jargon can make it challenging to determine which tools have substantive value and relevance for a given organization, however. Just because an impressive new product or feature exists doesn't mean adoption makes business sense for every enterprise. Before making any new investments, cybersecurity leaders should first assess and prioritize their own unique, risk-based security needs. After clarifying their requirements, they can start to navigate the complex cybersecurity market.


The fourth industrial revolution is here and is changing the way people work in ways that are still hard to believe. On the one hand, organizations are shifting to permanent or hybrid remote work setups since they provide opportunities to trim operating costs and weather an uncertain economic future.

On the other hand, organizations are fighting against remote work culture, which they believe adversely impacts their effectiveness. At the same time, many businesses are accelerating investments in artificial intelligence to boost automation, operational efficiency and business productivity.

Let's explore the potential threats that emerge from the intersection of hybrid working and technology advancements:


AI-Powered Cloud Siem: Real-Time Threat Intel Boosts Defences
ComputerWeekly, Thursday, September 7,2023
Thanks to their advanced data analysis and predictive capabilities, AI and ML will be valuable protective tools going forward. Learn about the potential of AI-backed cloud SIEM technology

Cyber attacks in 2023 continue to gain traction. As dwell times lessen, cyber crime rates are developing quicker, leading to higher frequencies of cyber attack attempts. But companies at large and small scales are fighting back, opting to adopt higher protective measures with expanded cyber security capabilities.

For example, Google has recently switched to AI-backed cyber controls that utilise zero-trust security access restrictions, digital sovereignty, and threat defence to protect Google's digital workspaces. AI has become a key component in addressing operational technology (OT) system threats as well.


What Types of Data Breaches do you Need to Know About in 2023? By now, all firms should be aware that cybersecurity threats are among the leading risks any business faces. Within this, those that directly compromise sensitive data have the potential to be especially damaging.

With the typical cost of a data breach now reaching almost $4.5 million - a 15 percent increase over the last three years - it's critical that enterprises have the correct defenses in place. This means data protection at every level of the business, from initial perimeter defenses to preventing data exfiltration. But in order to implement this effectively, it's vital to understand what cybercriminals are looking for and the methods they'll use to get it.

The Importance of Data Security in the Enterprise

Poor data security can have a wide range of repercussions for a business. Failing in this area can do a lot more than simply disrupt activity in the short term. Serious incidents can not only cost huge amounts of money, but lead to an exodus of customers and even threaten the future viability of the organization.


In the early-morning hours of Feb. 25, 2021, Terri Ripley got the call every chief information officer dreads: Her company, OrthoVirginia Inc., had been hit by a massive attack of the Ryuk ransomware that had shut down its entire computing fabric.

Although it would be 18 months before systems were fully restored, OrthoVirginia never shut down operations or abandoned patients. What it learned during the crisis is a lesson for any organization that might become an attack target. Today, that's everyone.

Speaking at the Healthcare Information and Management Systems Society Inc.'s Healthcare Cybersecurity Forum in Boston this week, Ripley gave a blow-by-blow description of the events immediately following the attack, the critical choices that were made and how the company is insulating itself from future incidents.

See all Archived IT News - Security articles See all articles from this issue