For organisations and government agencies alike, strong identity management is paramount. Millions of people share sensitive, personal information with commercial and public bodies every day, so companies and public sector agencies have a responsibility to secure their assets.
This is where ICAM and FICAM come in.
What is ICAM?
Identity,…
This is the third and final blog post in our Adapt to the Cloud Operating Model series.
With any organisational change that impacts people, process, and technology, it’s best to take it in stride. When talking with customers about their Zero Trust security initiatives, an analogy I often use is: “if Google’s BeyondCorp is the peak of Mt. Everest,…
SMS authentication—also known as SMS-based two-factor authentication (2FA) and SMS one-time password (OTP)—allows users to verify their identities with a code that is sent to them via text message. A form of two-factor authentication, it often acts as a second verifier for users to gain access to a network, system, or application, and is a good…
Viruses, spyware, and other malware can affect more than just desktop computers and laptops. Mobile devices are vulnerable as well. As the threat landscape continues to evolve, it’s important that we not only understand these risks—but how we can protect ourselves against them.
In this post, we’ll take a closer look at the mobile phone security…
Zero Trust security is a new strategy for keeping enterprise data secure, rooted in the idea that you can no longer rely on the network perimeter to assess trust. In a Zero Trust model, people are the new perimeter, and identity is the core of maintaining a secure environment.
An evolving landscape
Historically, organisations have kept their data…
Identity governance and administration (IGA) is a policy-based approach to identity management and access control. As the name implies, IGA systems merge identity governance and identity administration to provide additional functionality beyond traditional identity and access management (IAM) tools. Particularly, they offer valuable support in…
Vishing (or “voice phishing”) is a type of social engineering scam where an attacker tries to trick their target into surrendering sensitive data over the phone.
As with other social engineering attacks, these phone phishing scams prey upon human emotions—attackers often create false scenarios that cause panic (e.g., security alerts) or desire (e…
Can you think of a moment before 2020 when the words “in these unprecedented times” have been more widely used? Organisations all over the world are pushing their creativity to the limit to keep “business as usual” under very unusual circumstances. The coronavirus situation has impacted companies of every size, including FREE NOW, the multiservice…
The world has increasingly become mobile-first, with customers demanding seamless experiences across all of their devices to interact with brands, services, and products. But when it comes to building these customer experiences, developers are often forced to make tradeoffs between usability and security—difficult choices that inevitably…
API is an acronym that stands for “application programming interface,” and it allows apps to send information between each other. While there are numerous protocols and technologies involved, the underlying purpose of APIs is always the same: to let one piece of software communicate with another.
APIs (sometimes described as web services) work in…