article thumbnail

Three Ways Banks Can Improve Identity Authentication and Customer Data Privacy

CIO

As financial services become more digital in nature, it’s important that banks think differently when using data analytics, security tools, and education to improve identity authentication and customer data privacy. Have you thought about what can be done with this device to enhance identity authentication?

article thumbnail

CVE-2023-38035: Ivanti Sentry API Authentication Bypass Zero-Day Exploited in the Wild

Tenable

CVE Description CVSSv3 Severity CVE-2023-38035 Ivanti Sentry API Authentication Bypass Vulnerability 9.8 Analysis CVE-2023-38035 is an authentication bypass vulnerability in the MobileIron Configuration Service (MICS) Admin Portal of the Ivanti Sentry System Manager.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Generative AI’s role in increasing IT efficiency

CIO

In many cases, a genAI platform trained on the enterprise’s data — from telemetry data to knowledge base articles — can help individual employees, customers, and partners resolve IT issues all on their own. It analyzes past root cause reports to uncover authentic causal links between past and current events.

article thumbnail

The Smart Way to Handle Your Agent Shortage Problem this Holiday Season

CIO

Consider customer authentication: you must verify the identity of each person who contacts your organization, right? This could be through knowledge-based authentication (ex: “What’s the city you were born in?”) Your agents will be freed from time-consuming, queue-clogging tasks nearly overnight.

article thumbnail

CVE-2023-35078: Ivanti Endpoint Manager Mobile (EPMM) / MobileIron Core Unauthenticated API Access Vulnerability

Tenable

CVE Description CVSSv3 Severity CVE-2023-35078 Ivanti Endpoint Manager Mobile (EPMM) Authentication Bypass Vulnerability 10.0 Analysis CVE-2023-35078 is an authentication bypass vulnerability in Ivanti’s EPMM. Tenable was provided access to the support article and our blog post reflects what we currently know about this vulnerability.

Mobile 98
article thumbnail

3 examples of organizations improving CX with self-composed AI

CIO

Traditional identity verification methods like knowledge-based authentication (e.g. Conversational context collected by the bots is key for the company to see and understand problematic customer journeys and how to fix them as soon as possible. what’s your mother’s maiden name?”)

Examples 188
article thumbnail

Cleary raises $4.5M to reinvent the intranet

TechCrunch

Cleary combines a communications platform, wikis, tools for helping businesses recognize their employees (at least virtually), an employee directory with org charts, a search tool that brings together a company’s knowledge base from across various third-party tools and a Q&A service for live events.