12 episodes

Welcome to IAM Pulse by BIO-key International: where we discuss Identity Access Management (IAM) through pulses and episodes at a time. As cybersecurity becomes more complex and defending against hackers is puzzling, users require a modern digital experience to better protect their organization from cyberattacks. Fortunately, with BIO-key's IAM Pulse, you'll know what to do improve your users' experiences and enhance your cybersecurity.

IAM Pulse by BIO-key International BIO-key International

    • Technology

Welcome to IAM Pulse by BIO-key International: where we discuss Identity Access Management (IAM) through pulses and episodes at a time. As cybersecurity becomes more complex and defending against hackers is puzzling, users require a modern digital experience to better protect their organization from cyberattacks. Fortunately, with BIO-key's IAM Pulse, you'll know what to do improve your users' experiences and enhance your cybersecurity.

    12 - A Practical Path to MFA

    12 - A Practical Path to MFA

    While multi-factor authentication (MFA) is at the top of many counties' cybersecurity priorities, implementing MFA is not straightforward. MFA can be overwhelming when counties have to consider selecting the right authentication methods to not only keep their county secure but also make sure employees, suppliers and citizens have a good user experience. On this episode of IAM Pulse, we are joined by county CIOs to discuss how to best implement MFA and what county officials should be looking for in an MFA solution to improve user adoption.

    • 57 min
    11 - Don't Be Held Hostage, Stop Phishing and Ransomware

    11 - Don't Be Held Hostage, Stop Phishing and Ransomware

    In 2020, many community banks obtained more assets, customers, and liquidity, making them a prime target for cyber-attacks, especially during the COVID-19 pandemic. As a response, banks resorted to multi-factor authentication (MFA), but choosing the wrong MFA solution can result in big dividends. Regardless, community banks can be improving their cybersecurity measures, and for implementing MFA, traditional methods are starting to fail, meaning a migration to more modern MFA methods. What if you could cut your MFA costs in half, while providing effortless user experiences for online banking and work-from-anywhere authentication? In this episode of IAM Pulse, we talk about just that.

    • 37 min
    10 - The State of Multi-factor Authentication (MFA)

    10 - The State of Multi-factor Authentication (MFA)

    On behalf of BIO-Key International, Osterman Research conducted an in-depth survey of mid-sized and large organizations on the state of MFA and related issues during May 2021. The survey uncovered how organizations are managing security and authentication, and attitudes toward various authentication methods including Zero Trust, passwordless approaches, and biometrics. In this episode of IAM Pulse, we are going to discuss the implications of the survey findings and the role that MFA plays in any IAM solution to enable greater security and efficiency for controlling access to applications and resources.

    • 24 min
    9 - Designing and Implementing a Secure Web Portal

    9 - Designing and Implementing a Secure Web Portal

    On this shorter episode of IAM Pulse, we'll present a knowledge-based bite on the Education side of Cybersecurity. Today, we’re talking about Designing and Implementing a Secure, Fully Brandable Web Portal. As more users are going remote, organizations should be looking to improve the users’ digital experience. The topic also revolves around the digital environment that many students and faculty are being more involved in with the pandemic and online classes being more common or preferable to some. Questions like "What is a Portal?", "How can I properly secure it?", and "Which portal is best for my organization?" are ones we will discuss today.

    • 13 min
    8 - Contextual Authentication Configuration and User Segmentation

    8 - Contextual Authentication Configuration and User Segmentation

    Contextual authentication also known as risk-based or adaptive authentication attempts to strike the perfect balance between security and convenience. The concept is simple - enforce the appropriate level of authentication for a specific user under specific circumstances. In this episode of IAM Pulse, we discuss the best practices for setting up a strong rule hierarchy to make Contextual Authentication work for you.

    • 35 min
    7 - What keeps BIO-key's VP of Product, Kimberly Johnson Up at Night?

    7 - What keeps BIO-key's VP of Product, Kimberly Johnson Up at Night?

    From Scott Schober's "What Keeps You Up at Night", our own VP of Product, Kimberly Johnson, talks about her authentication nightmare while discussing the latest in cybersecurity especially Identity and Access Management.

    • 15 min

Top Podcasts In Technology