Identity and Access Management

Identity and Access Management
Zero Trust 2019Zero Trust 2019

How far along are today's CIOs on their journey to a zero trust architecture? Find out in this survey of 100 tech execs.

0 views
0 comments
Related Tags
What's a greater concern for returning to the office? Comment how you are prioritizing...

Top Answer : The majority of our focus is definitely on the human factors as the technical factors are mostly related to things we had to solve as we went distributed.  We will need some additional technical stuff to support the human factors (eg. scheduling software to limit the # of people in the office at the same time) but solving the human factors of helping people to feel comfortable, ensuring that safety precautions are being followed, etc... are much harder and why it will be a while before we go back.

How has GDPR and CCPA changed your use or procurement cybersecurity tools?

Top Answer : Not much directly but in some situations avoiding an agent, a plugin, or something that requires a cookie will mitigate privacy risks.  Many security technologies in how they are architected, deployed, and how the vendor gathers and shares information actually is generating a substantial amount of privacy risk

If these companies were affected then the foundation of computing could be at risk. If you could manipulate at the hardware layer via the firmware, BIOS, ect then a threat actor could weaponize well below the operating system which brings in to question the integrity of the entire computing stack and everything above it.  The firmware and bios are like the rebar and concrete for a building. If that foundation is weak then the entire structure and anything dependent on it is at risk. We cannot underestimate the potential or the severity of these companies being potentially affected by the SolarWinds hack and what that means for the foundational computing hardware they provide to the world.  What do others think ?  How could this impact your organization ?   Big tech companies including Intel, Nvidia, and Cisco were all infected during the SolarWinds hack - The Verge

Top Answer :

What is the difference between SSO and SAML?

Top Answer : Security Assertion Mark-up Language (SAML) is an authentication standard that allows for federated identity management and can support single sign-on (SSO). SSO is an authentication scheme that allows a user to log in with a single ID and password to any independent or federated software systems. In most use cases, SAML is used to provide SSO capabilities across independent systems.

97 views
27 comments
1 upvotes
Related Tags
Strong Authentication Deep DiveStrong Authentication Deep Dive

What type of authentication is more popular today: MFA or biometrics? Find out from 100 verified tech execs.

0 views
0 comments
Related Tags
Pulse Flash Read: Password(less) Passwords are rubbish, aren’t they?  We’ve all asked for someone else’s Netflix login, only to break out in a cold sweat when you see that their password is something like: basketball (yeah, they finally signed up to watch The Last Dance). And, let’s be honest, you didn’t feel great about them sending it over iMessage either. I’ve literally turned down free access to Netflix because of this. And cybersecurity experts like NordPass agree: they’re sick of telling us how rubbish passwords are.  Letting humans stay in control of those crucial windows of access that passwords reveal will always be problematic. The bad actors awaiting in that password-generated web traffic are experts at exploiting human faults. Take the recent Twitter hack: Two-Factor Authentication (2FA) seemed like a great extra layer of security until a fatal flaw in the thinking was revealed: all it took was some social engineering and the implicit trust users feel with 2FA was turned into a classic bit of phish bait. What if the answer is in the problem? Password-related attacks happen when human meets internet. Can we remove either or both of those issues? Turns out we can. Hardware Security Modules (HSMs) are secure pieces of hardware for containing digital information, lock and key in a discreet piece of machinery that fits neatly on your desk. (Actually, they’re pretty small nowadays, the main issue might be losing it, SD-card style.) They generate truly random keys, unlike computers, that exist outside of the internet’s nefarious reach, providing what’s known as Root of Trust (RoT); trusted nodes within a cryptographic system, a critically important element for any IoT network (and much more reliable than human secret-keepers). If you’d prefer not to ship out HSMs to all your remote staff, there are simpler options that, while not as cloaked as HSMs, at least bypass the password problem. Both AWS and Microsoft Azure offer OTP (One Time Password) access via SMS (yes, it might seem annoying at first but it takes less time than resetting that password we forgot 30 seconds after creating it), plus others such as Okta, OneLogin, Acceptto and Hitachi ID offer robust solutions. We produced a white paper with Microsoft you can read here about IT execs’ experiences with FirstLine Employee remote login.  Magic links are another option. San Fran-based Magic (formerly Fortmatic) promises ‘customizable, future-proof, passwordless login with a few lines of code’. All you have to do is embed Magic on your site and apps, clients receive an email link they click to sign in, and that’s that. The link, like that 5 of hearts you were watching, vanishes and the hijacking opportunity along with it. (Incidentally, Magic uses HSMs to handle your data.) Here’s a guide of how to add Magic to your apps, including a more in-depth discussion of both HSMs and Magic. The demise of the password comes with an acceptance of our own limitations. We forget. We enjoy simplicity. We share. So, accept that your team are human and find a password alternative that fits your needs. Because if you don’t, those clients, and your investors, might end up being another thing you’re scrambling to retrieve. What startups/tech are you excited about in the passwordless space?

Top Answer : This is our first editorial piece by our community editor Aaron Towlson. Would love your thoughts on it and if you'd like to see more of these to spark discussions  . Thanks!

Password Management End-user EngagementPassword Management End-user Engagement

What are the factors CIOs consider when choosing a password management tool? The verified Pulse CIO community weighs in.

Are you prioritizing passwordless access right now? If so, what are the main reasons behind the initiative, and what's the biggest challenge you've faced?

Top Answer : users must change their passwords regularly using a reset program and if they forget they are given a reminder to change and update passwords.

63 views
6 comments
2 upvotes
Related Tags