Archives

  1. Ping Supports International Fraud Awareness Week

    November 12-18 is International Fraud Awareness Week. As one of the top enterprise identity providers, Ping Identity is dedicated to spreading the message of Fraud Awareness Week. Not only do we provide top identity fraud protection solutions, but we also promote identity fraud protection best practices among customers and peers. Ping is constantly monitoring the…

  2. Achieving Passwordless for People & Machines

  3. Adopting Zero Trust in a Post-Pandemic World

  4. Beyond Best Practices TWG Brings New Insights and Also… Sharks?

    As we celebrate the first-ever Identity Management Day, I had a chance to reflect on the Beyond Best Practices Technical Working Group’s contributions over the past year, and one word came to mind: Creativity. It’s the one skill that underpins nearly every successful identity management team. Whether it’s finding a way to glue together the Active…

  5. Identity Management Day: What Sharks and Your Identity Program Have in Common

    Legend has it that in 1988 the idea for Shark Week was hatched over a round of drinks and documented on the back of a napkin as an awesome (and fun) way to capture more viewers. Seems like it worked: Discovery Channel viewers doubled after the very first Shark Week. Fast forward to 2021, and…

  6. The Unique Challenges of Customer Identity and Access Management

    As the world faced quarantines, stay at home orders and shuttered businesses, even normally reluctant consumers were forced to go online to grocery shop, order take-out and stay connected to friends and family. This focus on transacting daily tasks on-line placed a major spotlight on an emerging subset of identity security, customer identity and access…

  7. BYO[D] Doesn’t Have to Mean Bring Your Own [Vulnerability]

    The Bring-Your-Own-Device (BYOD) model of operating has been a double-edged sword for IT professionals. On the one hand, it empowers and allows for business productivity. On the other hand, it continues to create a serious challenge for organizations as IT and security professionals find ways to enforce access control across a diverse ecosystem of mobile…

  8. The Language of Identity: Bringing Everyone Together

    Everyone in computer science understands the importance of standardized programming languages, and yet, in conversations between security practitioners and IT infrastructure managers about identity, much seems to get lost in translation. Terms like authorization and authentication are often used interchangeably, but also have distinct meanings to different people. Say authentication to a security person, and…

  9. Webinar: Identity-Centric Security – Where Do I Start?

    A panel discussion talks on the “why” and “where do I start” of identity-centric security. While identity has not been considered a foundation of most security architectures, it is emerging as the key to reducing the risk of a breach. The Identity Defined Security Alliance is working to help organizations succeed in the battle to…

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.