17 - 2022 Cyber Predictions: What's Coming and What Can We Do About It?
IAM Pulse by BIO-key International
by BIO-key International
2y ago
Cyberattacks took the spotlight in 2021, constantly highlighting the weaknesses in current defenses and the need to improve and evolve cybersecurity strategies, but what will 2022 bring to the cyber space? To paint a better picture, we've teamed up with IT professionals across various industries to get their opinions on what to expect this year and how to secure digital experiences and prepare your organization for new cyber challenges moving forward. We talk about ransomware-as-a-business, zero trust adoption, Log4j aftermath, and many more hot topics ..read more
Visit website
16 - Why Your Users Resist IT
IAM Pulse by BIO-key International
by BIO-key International
2y ago
Cybersecurity is something your users don't always like. With cybersecurity being a requirement for all organizations in the wake of growing cyberattacks, organizations need to implement stronger security policies. However, we know stronger security policies tend to make this process frustrating for your users, so how do organizations get more of their users involved and improve user adoption? How can organizations smooth out the experience and still improve security. Listen to this episode of IAM Pulse and find out. Visit our website: www.bio-key.com ..read more
Visit website
15 - The First Ransomware Death: Springhill Medical Center
IAM Pulse by BIO-key International
by BIO-key International
2y ago
In this episode of IAM Pulse, we review ransomware and unfortunately, the first ransomware-caused death. How does ransomware affect critical infrastructure and does this upcoming lawsuit against Springhill Medical Center change anything notable in cybersecurity? We talk all about this ..read more
Visit website
14 - What is Identity-Bound Biometrics?
IAM Pulse by BIO-key International
by BIO-key International
2y ago
On this episode of IAM Pulse, BIO-key's SVP of Strategy and Compliance and Chief Legal Officer, Jim Sullivan, talks to us about Identity Bound Biometrics. What is IBB, and how does IBB differ from traditional device-based biometrics? When should organizations utilize IBB? Listen to the answers here ..read more
Visit website
Issues with Traditional Authentication
IAM Pulse by BIO-key International
by BIO-key International
2y ago
On this bonus episode of IAM Pulse, we talk about the issues we see with traditional authentication methods ..read more
Visit website
13 - Why Organizations Need Multi-factor Authentication
IAM Pulse by BIO-key International
by BIO-key International
2y ago
On this episode of IAM Pulse, our VP of Product, Kimberly Johnson is featured on the QSights Podcast to talk about MFA. Kimberly informs on the importance of investing in multi-factor authentication (MFA) across company devices, how to go about implementing the technology, and why some companies may be resistant towards the security measure. We also discuss some of the recent, large-scale U.S. cyberattacks and how MFA can help protect against these crimes ..read more
Visit website
12 - A Practical Path to MFA
IAM Pulse by BIO-key International
by BIO-key International
2y ago
While multi-factor authentication (MFA) is at the top of many counties' cybersecurity priorities, implementing MFA is not straightforward. MFA can be overwhelming when counties have to consider selecting the right authentication methods to not only keep their county secure but also make sure employees, suppliers and citizens have a good user experience. On this episode of IAM Pulse, we are joined by county CIOs to discuss how to best implement MFA and what county officials should be looking for in an MFA solution to improve user adoption ..read more
Visit website
11 - Don't Be Held Hostage, Stop Phishing and Ransomware
IAM Pulse by BIO-key International
by BIO-key International
2y ago
In 2020, many community banks obtained more assets, customers, and liquidity, making them a prime target for cyber-attacks, especially during the COVID-19 pandemic. As a response, banks resorted to multi-factor authentication (MFA), but choosing the wrong MFA solution can result in big dividends. Regardless, community banks can be improving their cybersecurity measures, and for implementing MFA, traditional methods are starting to fail, meaning a migration to more modern MFA methods. What if you could cut your MFA costs in half, while providing effortless user experiences for online banking an ..read more
Visit website
10 - The State of Multi-factor Authentication (MFA)
IAM Pulse by BIO-key International
by BIO-key International
2y ago
On behalf of BIO-Key International, Osterman Research conducted an in-depth survey of mid-sized and large organizations on the state of MFA and related issues during May 2021. The survey uncovered how organizations are managing security and authentication, and attitudes toward various authentication methods including Zero Trust, passwordless approaches, and biometrics. In this episode of IAM Pulse, we are going to discuss the implications of the survey findings and the role that MFA plays in any IAM solut ..read more
Visit website
9 - Designing and Implementing a Secure Web Portal
IAM Pulse by BIO-key International
by BIO-key International
3y ago
On this shorter episode of IAM Pulse, we'll present a knowledge-based bite on the Education side of Cybersecurity. Today, we’re talking about Designing and Implementing a Secure, Fully Brandable Web Portal. As more users are going remote, organizations should be looking to improve the users’ digital experience. The topic also revolves around the digital environment that many students and faculty are being more involved in with the pandemic and online classes being more common or preferable to some. Questions like "What is a Portal?", "How can I properly secure it?", and "Which portal is best f ..read more
Visit website

Follow IAM Pulse by BIO-key International on FeedSpot

Continue with Google
Continue with Apple
OR