Passwords, passwords, and more passwords. It’s tiring, offers poor security, and is now old hat. The future is passwordless authentication….
Azure AD is the most popular tool for Access Management. However, most Identity Management, Governance, and Identity Administration features must…
Identity and Access Management (IAM) is a complicated technology. Most vendors sell products that reflect the complexity of IAM technology….
You don’t want to move ahead with your Zero Trust Security implementation before you learn what’s best (new) on the…
Noncompliance with IRDAI’s latest mandates could result in hefty fines or worse. CI from Cross Identity, an Indian IAM company…
Every business, regardless of its nature and size, is a potential target for cyberattacks. Organizations today are aware of the…
The Insurance Regulatory and Development Authority of India (IRDAI) guidelines were recently published for insurance companies and brokerage houses. Noncompliance…
Almost every day, we wake up to news about data breach, data manipulation and identity breaking into an essential system,…
Pay-per-use model is a true innovation of the subscription model. It decreases the entry cost of IAM to 1/10X. The…
What shines isn’t always Gold One of the first vendors that spring to mind when thinking about Access Management is…
Let’s face it: IAM is costing you a fortune. You may have Access Management (AM), and maybe Identity Governance and…
In 2021, leading industry analyst Gartner predicted that ‘over 70% of new IAM implementations by 2023 will be Converged IAM.’…
Almost every day, we wake up to news about data breach, data manipulation and identity theft. This has led us…
In the year 2005, the world heard about the first major data breach where 1.4 million credit card numbers…
While most of us believe that cyber attackers would be wary of human intelligence to combat cybercrimes; attackers have a…
The advent of mobile phones, as we all know, changed the game of communications—”made the world smaller” as it is…
We all grew up reading about the unfortunate yet famous war times. The stories igniting several movies, stringing at the…
How CI Helps Cooperative Banks Meet RBI’s Latest Security Guidelines After discovering that Indian urban cooperative banks (UCBs) have been…
Learn How CI Delivers If you are thinking of adopting Zero Trust principles in your IT environment, you would be…
As IGA technology and solutions continue to evolve, industry analyst Gartner released their latest review of what products are best…
If you are looking for an IAM product, don’t miss out on Converged IAM. It will be preferred by over…
It is dangerous to be stuck in the past. What you knew yesterday could result in failure today. If you…
You wouldn’t buy a home security system without understanding what methods burglars typically use to get into your home. So…
With great power comes great responsibility – most of us have heard this famous quote. When it comes to businesses…
After discovering that Indian urban cooperative banks (UCBs) had been consistently failing to maintain an acceptable degree of security within…
In October 2019, more than 1.3 million credit and debit card details from Indian banks were found available for sale…
Corporate Network Snooping, in a security context, is gaining or trying to gain unauthorized access to another employee’s or the…
Traditionally, Identity and Access Management has been considered an investment only pertinent to large scale enterprises. However, over the last…
There are three key dimensions that are extremely important for the success of any IAM solution. Any identity and access…
Looking at the bigger picture, mergers and acquisitions often prove highly beneficial for organizations in the longer run and help…
Since 2018, the average number of incidents involving employee or contractor negligence has increased from 13.2 to 14.5 per organization….
Just a few years ago, Access Management was still considered a luxury or ‘nice-to-have’ by most organizations. But today, especially…
Identity Management is associated with improved convenience, better authentication, and enhanced security. Popularly, it is thought of as Single Sign-on…
Some of the things that come as part and parcel of dealing with software solutions from vendors are – the…
Remote work has taken over all parts of the world for everything apart from essential services due to COVID-19 pandemic….
Cross Identity has been in the Identity Management space since the year 2000. Identity Management is a cybersecurity discipline. With…
According to the “Modern Bank Heists’ report by VMware Carbon Black, this coronavirus period has seen a 238% surge in…
Budget cuts and dwindling resources are center-front in COVID-19 times. How does a business determine what to purchase and what…
A product is made for its users. However, with the onslaught of new technologies, solutions are being created by showcasing…
Access Reviews Pose a Critical Challenge Even Today Access reviews pose a challenge for all companies. Compliance with regulatory statutes…
Situations in which access reviews are done manually, and often with faulty results which cause auditors to raise a lot…
Educational institutions have always been targets for hackers. The reason is quite simple, there is a lot of data out…
You hear reports of data breaches of different scales every other day. Sometimes the companies are applauded for the way…
Passwords are meant to secure critical accounts and applications. However, in this digital age, passwords are more of a cyber…
DIY or Do-It-Yourself is a seemingly interesting trend. Making things on your own which you’d otherwise have to buy is…
The tug of war between organizations aiming to achieve optimal cyber security and cyber attackers who are determined to break…