Identity Management

Identity Management news, information, and how-to advice

biometrics
dirty numbers playground

name badges hello

Security leaders can unite the business around identity

Kevin Cunningham shares insights on why identity is a smart way to bring your business colleagues together to support security efforts

firewall hole

Third parties leave your network open to attacks

With the Target example as the high-water mark, enterprises need to worry about the lack of security on a third parties’ part. How do you tighten things up?

1 tracking hunting dogs horse

Pitfalls of identity access management

Whether dealing with a third parties access or tracking an insider through your network, action needs to be taken to see who goes where. Too few organizations treat IAM as the crucial, secure connective tissue between businesses'...

passwords

Security entrepreneur’s tiny hack-proof password computer

PasswordsFAST personal password manager product review

1 transform phone payment

10 ways Trusted Identities are used

It is always a struggle to control who gets into your network. A third-party might need access for the contractual work they are doing. HID Global runs through some ways trusted identities are used.

behavior facial expressions emotions

You can steal my identity, but not my behavior

The compromise and misuse of identity is at the core of modern threats and data breaches. This has been documented for years and continues to escalate. As a result, we are rapidly approaching the end of life for password-based...

sprint track runners

Security leaders need to sprint before getting forced to scramble

Udi Mokady shares insights on the changing nature of security threats and how a focused sprint now builds trust and sets the stage for future success

binoculars desert

Cybersecurity companies to watch

CBInsights created a list of startups that its metrics showed has early-to mid-stage high-momentum companies pioneering technology with the potential to transform cybersecurity. 

1 app hacked

How to prevent your mobile app from getting hacked

TriviaCrack may be addicting to users, but criminals are hooked on getting your personal information from other apps you use

Hacker in silouhette at laptop

Cybercrime diaries: All the hacks and data breaches in one place

The cybercrime diaries are a series of blogs that provide CIOs, CSOs, CISOs and IT security teams with bulleted datelines and high-level summary commentary on the most noteworthy cybercriminal activity in a quarterly period.

danielle jackson

Danielle Jackson joins SecureAuth as chief information security officer

SecureAuth hires a new CISO, Danielle Jackson, with experience in network, system, data, cloud and security design.

watson dumb executives primary2

Report says smart people do dumb things online

People from the religious and legal fields were considered lazy for not following security standards.

cloud security

Google tries to beat AWS at cloud security

New tools that protect enterprise applications running on Google Cloud Platform may help take the spotlight away from AWS and Microsoft Azure

head scratcher strategy thinking

3 ways to improve the security of identity and access management

A highly effective identity and access management program will always deliver business value. However, treating architecture and security as an afterthought can - and often does - result in massive data breaches that have significant...

verizon sign

Verizon's risky business: Acquiring the world's biggest hack

Verizon's biggest risk is acquiring Yahoo, victim of the biggest hack ever.

Gmail Google Mail

Google prevents 10 million malicious emails every 60 seconds; Gmail users beware

Gmail phishing and malware attacks on Gmail users can be prevented

diverse group of millennials holding up score card numbers

Beyond risk scoring

Risk scoring is not an end in itself once it shows up color coded and normalized between 0 and 100 in a security operations center (SOC) dashboard. To provide real value it must be supplemented by a closed-loop response process that...

false identity

Face-off: Oracle vs. CA for identity management

Considering identity and access management (IAM) software? Download this free report for side-by-side comparisons of rival products from Oracle and CA, based on reviews written by enterprise users of the products.

Load More