With decentralized identity management, access is distributed across multiple environments. Users must have different sets of credentials for any applications they access. Here’s a quick take on decentralized identity:
For more on these technologies, visit the Identity and Access Centers of Excellence page sponsored by Ping.
Victoria Willis is an editor for SC Media.


Research from Ping Identity and Yubico found IT leaders across the globe want to eliminate passwords, including 94% who are concerned about passwords and half who worry they are too weak for security purposes. 

Government, humanitarian, and think tank organizations around the world have been targeted in a years-long mass credential theft campaign by Chinese state-sponsored threat group RedAlpha, The Hacker News reports.

On-Demand Event

On-Demand Event

Copyright © 2022 CyberRisk Alliance, LLC All Rights Reserved This material may not be published, broadcast, rewritten or redistributed in any form without prior authorization.
Your use of this website constitutes acceptance of CyberRisk Alliance Privacy Policy and Terms & Conditions.

source