This blog was originally published by Bravura here. Managing data access is an ongoing journey for businesses in the financial services industry. Policies such as the Sarbanes-Oxley (SOX) Act and the Gramm-Leach-Bliley Act (GLBA) establish regulations that your business must follow when implementing any identity access management (IAM) or privileged access management (PAM) tool. Auditors will check your system for compliance…
Archives
-
BeIdentitySmart, BeCyberSmart for Security Practitioners
The phrase “a dog is for life, not just for Christmas” was coined by British animal welfare charity Dogs Trust over 40 years ago and still rings true to this day. The same theory must also be applied to securing digital identities in our increasingly turbulent modern business world. It’s all well and good having…
-
Connecting the Dots Between Cybersecurity and Managing Identity
The use of video doorbells and internal and external video cameras for home security has skyrocketed in recent years as homeowners seek new ways to protect themselves and their property. While these devices may capture images of potential intruders, they cannot confirm their identities. Is this really an employee from your electric company or is…