article thumbnail

Managing the whole lifecycle for human and machine authentication

CIO Business Intelligence

In my last column for CIO.com , I outlined some of the cybersecurity issues around user authentication for verification of consumer and business accounts. . FIDO as an industry initiative was set up a decade ago to standardize the need for strong authentication/password technologies. Well, yes, but there is more that tech pros can do.

article thumbnail

Tech leaders discuss generative AI’s impact on enterprise, startups and society

GeekWire

. “Conversational AI Roundtable,” an event hosted at the Bellevue Club by tech consulting firm Hitech Advisors , gathered industry leaders to discuss AI’s potential impacts on enterprises, startups and society. Enterprises should be aware of sharing their confidential data with AI, Datar said.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Don’t gamble with your identity verification practices

CIO Business Intelligence

Okta issued an alert to clients in late August warning about incoming threats by hackers to gain access to “manipulate the delegated authentication flow via Active Directory (AD) before calling the IT service desk at a targeted organization, requesting a reset of all MFA factors in the target account.”

article thumbnail

How to calculate TCO for enterprise software

CIO Business Intelligence

The other side of the cost/benefit equation — what the software will cost the organization, and not just sticker price — may not be as captivating when it comes to achieving approval for a software purchase, but it’s just as vital in determining the expected return on any enterprise software investment.

Software 127
article thumbnail

Healthcare Provider Suffers Data Breach Impacting 1.3 Million Patients

SecureWorld News

These steps include "the ongoing investigation, a password reset with enhanced security measures across the enterprise, and the implementation of multifactor authentication for all users of its systems.". However, the organization points out that there is no evidence the information was misused by the threat actor—at least not yet.

article thumbnail

Cybersecurity for enterprise: 10 essential PAM considerations for modern hybrid enterprises

CIO Business Intelligence

Supporting enterprise security during a cloud migration can be rife with pitfalls that can derail the initiative and ruin the customer experience. She joined the company in the middle of a corporate cloud transformation initiative and inherited a new Privileged Access Management (PAM) solution as part of an enterprise cybersecurity overhaul.

article thumbnail

Q&A with Verivo’s Steve Levy

The Investing Edge

It’s no surprise, then, that Verivo is considered an emerging enterprise mobility leader. Verivo helps businesses simplify the complexities associated with building, securing, and managing enterprise mobile apps. Brian Girvan: Steve, to start off, at a very high level, how would you frame where we are with enterprise mobility today?

Mobile 105