Identity Management

Identity Management news, information, and how-to advice

federal trade commission building ftc

Met museum puts new technologies on display

Night at the information security museum

Museum physical security incidents provide an excellent learning mechanism for information security teams. With that, I’d like to look at three major museum incidents and provide a lesson learned from each for information security...

plastc card iphone

Secure card maker Plastc Inc. considering Chapter 7 bankruptcy, halts operations

Early supporters of Plastc, the E-Ink and touchscreen smart card that offered a number of security features, got some bad news on Thursday. Plastc Inc. is exploring options for Chapter 7 Bankruptcy protection, and none of the...

1 transform phone payment

10 ways Trusted Identities are used

It is always a struggle to control who gets into your network. A third-party might need access for the contractual work they are doing. HID Global runs through some ways trusted identities are used.

handsome male executive holding finger up to be quiet keep a secret

How to keep virtual assistants from sharing your company's secrets

Consumers love talking to Alexa, Siri, Cortana and Google Now. But what should CIOs be doing to prepare for the growing use of virtual assistants among their employees?

behavior facial expressions emotions

You can steal my identity, but not my behavior

The compromise and misuse of identity is at the core of modern threats and data breaches. This has been documented for years and continues to escalate. As a result, we are rapidly approaching the end of life for password-based...

sprint track runners

Security leaders need to sprint before getting forced to scramble

Udi Mokady shares insights on the changing nature of security threats and how a focused sprint now builds trust and sets the stage for future success

fbi agent laptop

Privacy for everybody means privacy for pedophiles

The so-called Playpen cases – which arose from the FBI running a child porn website as a sting operation – has prompted an intense debate over the Fourth Amendment’s protections from “unreasonable” search and seizure.

binoculars desert

Cybersecurity companies to watch

CBInsights created a list of startups that its metrics showed has early-to mid-stage high-momentum companies pioneering technology with the potential to transform cybersecurity. 

1 app hacked

How to prevent your mobile app from getting hacked

TriviaCrack may be addicting to users, but criminals are hooked on getting your personal information from other apps you use

messaging apps threats security privacy thought bubbles

Honesty is not the best privacy policy

Hackers, tech companies and governments want our personal information. Only lies can save us now.

Windows 10 Privacy in the Creators Update
video

Windows 10 Privacy in the Creators Update

Windows 10 privacy settings are easier to find and use in the Creators Update. But there's a difference between getting more control and getting more privacy.

Hacker in silouhette at laptop

Cybercrime diaries: All the hacks and data breaches in one place

The cybercrime diaries are a series of blogs that provide CIOs, CSOs, CISOs and IT security teams with bulleted datelines and high-level summary commentary on the most noteworthy cybercriminal activity in a quarterly period.

06 vpn

The best VPNs 2017

What is a VPN? If you're concerned about online privacy, a virtual private network (VPN) will help keep snoopers at bay. We round up the best VPN services for hiding your location online and allowing you to access blocked content and...

executives sitting in board room at conference table

How CISOs can explain privacy to the C-suite

With the recent moves by the FCC, it is imperative that chief security officers make the company aware of privacy issues.

thinkstock privacy please

FCC privacy ruling could leave enterprises' data vulnerable

The recent repeal of new FCC rules designed to strengthen personal privacy among consumers by limiting the uses ISPs can make of their personal data also has implications for companies who use these services. Security and privacy...

coal power station

New report examines the weaknesses of industrial environments

A new report from FireEye examines the attack surfaces shared by a number of industrial enterprise operations, including electric utilities, petroleum companies, and manufacturing organizations. The six weaknesses outlined by FireEye...

https ssl certificate

DNS record will help prevent unauthorized SSL certificates

Starting in September, publicly trusted certificate authorities will have to honor a special Domain Name System (DNS) record that allows domain owners to specify who is allowed to issue SSL certificates for their domains.

messaging apps threats security privacy thought bubbles

Rollback of FCC privacy requirements could have broad repercussions

Last week's roll-back of FCC privacy regulations was good news for ISPs and marketers and bad news for privacy advocates. But the decision could also have an impact on enterprise cybersecurity, experts say

Load More