Skip to main content
IAM Pulse by BIO-key International

IAM Pulse by BIO-key International

By BIO-key International

Welcome to IAM Pulse by BIO-key International: where we discuss Identity Access Management (IAM) through pulses and episodes at a time. As cybersecurity becomes more complex and defending against hackers is puzzling, users require a modern digital experience to better protect their organization from cyberattacks. Fortunately, with BIO-key's IAM Pulse, you'll know what to do improve your users' experiences and enhance your cybersecurity.
Available on
Apple Podcasts Logo
Google Podcasts Logo
Pocket Casts Logo
RadioPublic Logo
Spotify Logo
Currently playing episode

17 - 2022 Cyber Predictions: What's Coming and What Can We Do About It?

IAM Pulse by BIO-key InternationalFeb 02, 2022

00:00
59:42
17 - 2022 Cyber Predictions: What's Coming and What Can We Do About It?

17 - 2022 Cyber Predictions: What's Coming and What Can We Do About It?

Cyberattacks took the spotlight in 2021, constantly highlighting the weaknesses in current defenses and the need to improve and evolve cybersecurity strategies, but what will 2022 bring to the cyber space? To paint a better picture, we've teamed up with IT professionals across various industries to get their opinions on what to expect this year and how to secure digital experiences and prepare your organization for new cyber challenges moving forward. We talk about ransomware-as-a-business, zero trust adoption, Log4j aftermath, and many more hot topics.

Feb 02, 202259:42
16 - Why Your Users Resist IT

16 - Why Your Users Resist IT

Cybersecurity is something your users don't always like. With cybersecurity being a requirement for all organizations in the wake of growing cyberattacks, organizations need to implement stronger security policies. However, we know stronger security policies tend to make this process frustrating for your users, so how do organizations get more of their users involved and improve user adoption? How can organizations smooth out the experience and still improve security. Listen to this episode of IAM Pulse and find out. Visit our website: www.bio-key.com


Jan 12, 202221:07
15 - The First Ransomware Death: Springhill Medical Center

15 - The First Ransomware Death: Springhill Medical Center

In this episode of IAM Pulse, we review ransomware and unfortunately, the first ransomware-caused death. How does ransomware affect critical infrastructure and does this upcoming lawsuit against Springhill Medical Center change anything notable in cybersecurity? We talk all about this.

Dec 08, 202121:28
14 - What is Identity-Bound Biometrics?

14 - What is Identity-Bound Biometrics?

On this episode of IAM Pulse, BIO-key's SVP of Strategy and Compliance and Chief Legal Officer, Jim Sullivan, talks to us about Identity Bound Biometrics. What is IBB, and how does IBB differ from traditional device-based biometrics? When should organizations utilize IBB? Listen to the answers here.

Oct 27, 202112:32
Issues with Traditional Authentication

Issues with Traditional Authentication

On this bonus episode of IAM Pulse, we talk about the issues we see with traditional authentication methods.

Oct 15, 202126:50
13 - Why Organizations Need Multi-factor Authentication

13 - Why Organizations Need Multi-factor Authentication

On this episode of IAM Pulse, our VP of Product, Kimberly Johnson is featured on the QSights Podcast to talk about MFA. Kimberly informs on the importance of investing in multi-factor authentication (MFA) across company devices, how to go about implementing the technology, and why some companies may be resistant towards the security measure. We also discuss some of the recent, large-scale U.S. cyberattacks and how MFA can help protect against these crimes.

Oct 06, 202131:42
12 - A Practical Path to MFA

12 - A Practical Path to MFA

While multi-factor authentication (MFA) is at the top of many counties' cybersecurity priorities, implementing MFA is not straightforward. MFA can be overwhelming when counties have to consider selecting the right authentication methods to not only keep their county secure but also make sure employees, suppliers and citizens have a good user experience. On this episode of IAM Pulse, we are joined by county CIOs to discuss how to best implement MFA and what county officials should be looking for in an MFA solution to improve user adoption.

Sep 15, 202157:46
11 - Don't Be Held Hostage, Stop Phishing and Ransomware

11 - Don't Be Held Hostage, Stop Phishing and Ransomware

In 2020, many community banks obtained more assets, customers, and liquidity, making them a prime target for cyber-attacks, especially during the COVID-19 pandemic. As a response, banks resorted to multi-factor authentication (MFA), but choosing the wrong MFA solution can result in big dividends. Regardless, community banks can be improving their cybersecurity measures, and for implementing MFA, traditional methods are starting to fail, meaning a migration to more modern MFA methods. What if you could cut your MFA costs in half, while providing effortless user experiences for online banking and work-from-anywhere authentication? In this episode of IAM Pulse, we talk about just that.

Aug 25, 202137:10
10 - The State of Multi-factor Authentication (MFA)

10 - The State of Multi-factor Authentication (MFA)

On behalf of BIO-Key International, Osterman Research conducted an in-depth survey of mid-sized and large organizations on the state of MFA and related issues during May 2021. The survey uncovered how organizations are managing security and authentication, and attitudes toward various authentication methods including Zero Trust, passwordless approaches, and biometrics. In this episode of IAM Pulse, we are going to discuss the implications of the survey findings and the role that MFA plays in any IAM solution to enable greater security and efficiency for controlling access to applications and resources.

Aug 04, 202124:08
9 - Designing and Implementing a Secure Web Portal

9 - Designing and Implementing a Secure Web Portal

On this shorter episode of IAM Pulse, we'll present a knowledge-based bite on the Education side of Cybersecurity. Today, we’re talking about Designing and Implementing a Secure, Fully Brandable Web Portal. As more users are going remote, organizations should be looking to improve the users’ digital experience. The topic also revolves around the digital environment that many students and faculty are being more involved in with the pandemic and online classes being more common or preferable to some. Questions like "What is a Portal?", "How can I properly secure it?", and "Which portal is best for my organization?" are ones we will discuss today.

Jul 14, 202113:17
8 - Contextual Authentication Configuration and User Segmentation

8 - Contextual Authentication Configuration and User Segmentation

Contextual authentication also known as risk-based or adaptive authentication attempts to strike the perfect balance between security and convenience. The concept is simple - enforce the appropriate level of authentication for a specific user under specific circumstances. In this episode of IAM Pulse, we discuss the best practices for setting up a strong rule hierarchy to make Contextual Authentication work for you.

Jun 23, 202135:47
7 - What keeps BIO-key's VP of Product, Kimberly Johnson Up at Night?

7 - What keeps BIO-key's VP of Product, Kimberly Johnson Up at Night?

From Scott Schober's "What Keeps You Up at Night", our own VP of Product, Kimberly Johnson, talks about her authentication nightmare while discussing the latest in cybersecurity especially Identity and Access Management.

Jun 09, 202115:15
6 - BIO-key MobileAuth

6 - BIO-key MobileAuth

Traditional authentication methods are inconvenient, open to cyberattacks, expensive, and still can't verify "you are who you say you are". It's time for a different way to authenticate, but recent breaches show that passwords, OTPs, and hardware tokens are no longer reliable. Biometrics have become a preferred option for passwordless, but not all biometrics are created equal, so in this episode of IAM Pulse, we talk about BIO-key MobileAuth and how Palm Positive aims to change how authentication should be.

May 26, 202133:38
5 - Securing Access with PeopleSoft

5 - Securing Access with PeopleSoft

Most organizations are running hundreds, if not thousands of applications, with some running the critical operations of the business. This is the case with Oracle PeopleSoft, which runs inventory, financial services, and campus solutions for universities, colleges, and other institutions. However, when it comes to securing this application, it can be complicated and break the mold of a company's IAM strategy. This episode of IAM Pulse, we talk about how to involve PeopleSoft with your IAM strategy.

May 12, 202143:30
4 - Neumann University

4 - Neumann University

On this episode of IAM Pulse, we are joined by Kushan Fonseca from Neumann University discussing the cybersecurity in education perspective at Neumann University. We talk cybersecurity awareness for the staff, the students, and the challenges of cybersecurity in education.

Apr 28, 202133:49
3 - Cybersecurity in Education

3 - Cybersecurity in Education

On this episode of IAM Pulse, we are joined by Michael Sampson, Senior Analyst from Ostermann Research discussing the whitepaper he produced with a sponsorship from BIO-key called, Cybersecurity in Education. We talk about why the education sector is under a plethora of cyber attacks targeting it and the cybersecurity solutions that should be considered to prevent them.

Apr 14, 202144:20
2 - Out of Band Authentication, What is it and Why is it Essential?

2 - Out of Band Authentication, What is it and Why is it Essential?

What is Out of Band Authentication (OOB)? Is it different from MFA, and why is it essential? In this episode of IAM Pulse, we discuss what Out of Band Authentication is, which authentication methods are available to implement it and the pros and cons of them. How can your organization implement OOB Authentication properly? Listen to this episode and hear more.

Mar 31, 202130:15
1 - Deploying Multi-factor Authentication and How to Make It Go Smoothly

1 - Deploying Multi-factor Authentication and How to Make It Go Smoothly

While multi-factor authentication has become one of the best defenses for organizations to protect against cyberattacks, if it's not properly implemented & configured it can create frustration for your users. In this episode of IAM Pulse, we discuss how to deploy multi-factor authentication in a smooth way, making it easier for your users to adopt new security measures without causing frustration or security workarounds.

Mar 16, 202135:30