{"id":6833,"date":"2013-04-05T18:14:37","date_gmt":"2013-04-05T18:14:37","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/2606386"},"modified":"2013-04-05T18:14:37","modified_gmt":"2013-04-05T18:14:37","slug":"adaptive-risk-making-sure-you-are-who-you-say-you-are","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/adaptive-risk-making-sure-you-are-who-you-say-you-are\/","title":{"rendered":"Adaptive Risk: Making Sure You Are Who You Say You Are"},"content":{"rendered":"<p>Implement the predictive analytic process that is designed to assess\/score risk attributes during authentication so that Access Management can determine whether to require the user to complete further authentication steps.<br \/>\nDoes this sound familiar? Ann, sitting at her desk eating lunch, is surfing the Net. She checks her personal Yahoo email account and sees a message from a purported survey company asking her about her music preferences. She opens the email and takes the survey. Seems harmless enough, but what Ann doesn\u2019t know is that this survey company doesn\u2019t exist and embedded in some of the survey prompts hides an undetected botnet that downloaded onto her desktop. This nasty bugger can record her keystrokes and take screen shots as she navigates through your network. Now some unauthorized entity has her login credentials, passwords\u2026essentially her online\/employee  identity and access to your enterprise\u2019s proprietary assets and other sensitive data.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/2606386\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Implement the predictive analytic process that is designed to assess\/score risk attributes during authentication so that Access Management can determine whether to require the user to complete further authentication steps.<br \/>\nDoes this sound familiar? An&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-6833","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/6833","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=6833"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/6833\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=6833"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=6833"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=6833"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}