Home

2 juni 2023

Recap Identity & Access Management 2023

Op 23 mei was het dan zo ver, de 18de editie van Identity & Access Management is van start gegaan. Samen met ruim 200 bezoekers, 23 partners en 28 sprekers hebben kijken we terug op een zeer geslaagde editie. Onder leiding van niemand minder dan Meike de Jong hebben we zowel tijdens het programma als [...]
Lees verder
2 juni 2023

Identity Governance will be a Key to NIS2 Compliance

In January 2023, the European Union's (EU) updated Network and Information Security Directive, NIS2, came into force. EU Member States will have 21 months to transpose the articles of the Directive into their national legislation, with a due date of October 17, 2024. The requirements of the directive will have implications at the regional, national, [...]
Lees verder
16 mei 2023

Cyber Insurance Assessment Readiness Checklist

The booming cyber insurance market is a reaction to the explosion of cyberattacks and data breaches in the last few years. In 2021, attacks increased 50%, much more than businesses or insurers expected or budgeted for. Given that most cyber incidents involve compromised credentials, it’s no wonder insurance companies are tightening requirements related to Privileged [...]
Lees verder
16 mei 2023

Is Your Environment Adaptive Enough for Zero Trust?

Meeting zero trust security goals will require continuous analysis and access control. Although most organizations still use firewalls as their first line of defense, last year’s Executive Order (EO) 140281 stated concrete recommendations that included aggressive timelines. In an effort to make meaningful cybersecurity progress in protecting U.S. Government agencies, the directive requires them to [...]
Lees verder
28 april 2023

Enhancing consumer experiences while preventing cyber risks in finance

Globally, 73% of people utilize internet banking at least once every month. And more than 85 million EU consumers use digital-only banks or insurers to meet their everyday financial needs—roughly 11% of the whole population. For this reason, banking experiences must be easy and effortless. Friction along the user journey won’t go down easy. At [...]
Lees verder
28 april 2023

How identity management protects the European financial system

The European Central Bank, as a supervisory authority, requires a variety of processes and supporting applications, all of which are accessible to users through a portal. Access to these applications is strictly control by the bank in accordance with the highest security standards. The bank adheres to a Zero Trust security model and requires European [...]
Lees verder
28 april 2023

4 Steps to Comprehensive Service Account Security

Service accounts, dedicated non-human accounts used by systems, applications, and services to interact with other systems, are an IT infrastructure basic. They perform scheduled actions automatically and repeatedly in the background, typically going totally unnoticed, and sometimes, forgotten about, by security administrators. Here are countless service accounts in any What are Service Accounts given organization [...]
Lees verder
28 april 2023

Global Threat Report

The latest edition of the CrowdStrike Global Threat Report comes at an important time for protectors around the world. As organizations focus on managing remote and hybrid teams, operationalizing years of digital transformation and navigating an uncertain global economy, adversaries have become more sophisticated, relentless and damaging in their attacks. As a result, a number [...]
Lees verder
12 april 2023

Identity & Access Management Selection Guide

In chapter 2, we start from a helicopter view, and answer the question “what are the core needs any Identity and Access Management solution must address?”. We will discuss 5 essential functional needs, and the 4 most important quality attributes. In chapter 3, we extract the 20 most relevant generic selection criteria from those needs. [...]
Lees verder
12 april 2023

Risk-Based Authentication

Secure access used to be simpler. Everyone logged into the same corporate network, on a managed device, with firewalls to protect internal resources from outsiders. But we live in a hybrid-work world now, with more people working from home, in coffee shops, and while traveling. Each new login attempt from each place and device must [...]
Lees verder