Before leaving on an extended (and expensive) vacation, I bought travel insurance. I wanted to protect myself in case I or my traveling partner tested positive for COVID-19. I had…
Browsing CategoryIdentity
7 Holiday Cybersecurity Tips to Try Before The Year Ends
The holiday rush is upon us, and so is the risk of cyberattack. Threat actors often get to work during the holidays. IT staff is heading out for vacation, and…
Using Vendor Management to Defend Against Supply Chain Attacks
Supply chain attacks are growing more common. According to the Identity Theft Resource Center (ITRC), there were just 19 supply chain attacks in the final quarter of 2020. In the…
6 Benefits of Using Privileged Access Management
When you think of access, passwords are likely the first thing that pops into your head. While passwords are a large and important part of managing access, there are other…
Apple Says It’s Time to Digitize Your ID, Ready or Not
Digital driver’s licenses have had a slow start in the US so far, but iOS 15 Wallet will give the nascent technology a serious push.
Synthetic Identity Theft: When Everybody Knows Your Name
You probably have a place where everyone knows your name — and maybe your address and your birthday and your favorite drink. That place could be your favorite restaurant, your…
Consent Management: Picking the Right CIAM Strategy
Practically everything consumers do online — shopping, paying bills and signing up for new services — requires some level of personal data sharing or changing privacy settings. Consumers need to…
Solving 5 Challenges of Contact Tracing Apps
Contact tracing apps are designed to help public health agencies connect the dots by linking confirmed carriers of novel coronavirus to recent, close-proximity interactions. In theory, this creates a protective…
How to Make Personalized Marketing Effective With Consumer Identity Programs
Everyone is fighting for the attention of potential customers. It’s the work you’ve done; the creative energy expended by your team; and the amount of time your group spent just…
How Can Enterprises Protect Personally Identifiable Information?
With data breaches often appearing in the news, customers and enterprise leaders alike may be concerned that the enterprise isn’t doing enough to protect customers’ personally identifiable infomation (PII). As…