Get In Touch
There are two types of companies: Those who have been hacked, and those who don't yet know they have been hacked1 With data breaches frequently making the news and causing panic among network administrators, the above statement by former Cisco boss John Chambers in 2015 certainly doesn't seem far-fetched. I don't remember a week in 2018 going by where I wasn't learning of a data breach and how sophisticated the
Is it too late to still say "Happy New Year?" We don't think so. We're kicking off 2019 with our first issue of the State of the Internet / Security.
Application Servers are implemented as a means of providing services and making resources available to users. However, any server connected to the Internet is inevitably targeted by malicious users using open listening ports. There are millions of these ports on the Internet, which means there is plenty of opportunity to exploit these open services.
As mentioned in the 2018 Year in Review State of the Internet / Security report, trends in DDoS are remarkably stable. The size of the largest attacks have grown by approximately 6% on an annual basis, with occasional outliers like the Mirai botnet. The median size of attacks has been much more changeable, with a cyclic growth and retreat on a two year basis. Unluckily, the ebb of DDoS is
Identities are complicated. Getting to know someone well takes time and effort. When you first meet someone new, you ask a lot of questions to understand who they are and how you should relate to them. Social context also provides many cues for us as individuals. As relationships deepen, the nuance of individual personalities becomes revealed to us as we probe deeper, and also create shared experiences with others.
Protecting against online crime and fraud in an interconnected, cross-device world is more challenging than ever for companies transacting valuable assets with other companies over the Internet, selling products or information in a web application, or under regulatory compliance mandates.
Digital transformation is a challenging and complex endeavor, and it's easy to get tripped up by unforeseen issues. For many organizations, the focal point of their digital transformation strategies is throwing their weight behind new mobile initiatives. These can often include both internal and customer-facing platforms, designed for a variety of purposes. A mobile platform is only as good as the user experience (UX) it provides, and businesses that fail
The rise of the digital-native consumer creates tremendous opportunities for organizations to develop deeper relationships with their customers in support of their business objectives. Whether the goals are to acquire new leads, increase on-site engagement, collect and leverage customer insights or all of the above, a comprehensive customer identity and access management (CIAM) solution will play a critical role.
Truly knowing the customer is key to marketing success today. And it's not just about knowing their name, but understanding their true identity. The technology that makes this possible is known as customer identity and access management (CIAM).