Security Article Access token - Article Learn why an access token is a viable security mechanism for authorization and resource delegation in distributed environments. Article What is security assertion markup language (SAML)? Insurance Identity security for health funds - Customer success Education Automating onboarding and offboarding - Case study Article What is a user authentication policy? Webinar Recording Transform your security practice - Webinar Learn how to develop a clear roadmap for your identity security program and how a phased in approach can be a best practice for a successful deployment. Webinar Recording Revitalize your identity security strategy - Webinar See how one company got a second chance to implement an identity governance solution that matched outcomes with expectations and fully met business needs. Article Man in the middle (MITM) attack - Article Man in the middle attacks are common and often successful due to the many ways they can be executed; learn about several options available to stop them. Article Incident response plan fundamentals - Article See how a well-defined incident response plan in place helps organizations minimize the impact of security incidents and protect sensitive information. Article Cyber threat intelligence - Article See how, by leveraging cyber threat intelligence, organizations strengthen cyber defenses and respond effectively to sophisticated cybersecurity threats. Article Gramm-Leach-Bliley Act - Article See how the Gramm-Leach-Bliley Act enables security of customers’ information even with an increasingly complex and data-centric financial landscape. Article What is two-factor authentication? - Article See how two-factor authentication can be implemented as part of a layered approach to security that includes strong password practices and user education. Article What is digital security: Overview, types, and applications See how digital security helps ensure successful, resilient, and trustworthy IT operations in an ever-evolving landscape of threats and vulnerabilities. Article Unauthorized access - Article See how organizations that implement and maintain robust cybersecurity and threat monitoring systems are able to reduce the risk of unauthorized access. 123Next ›»