Identity Management

Identity Management news, information, and how-to advice

mobile payments / tablet
greedy

europe data privacy rules primary2

Hacking the GDPR

Using anonymization and pseudonymization to reduce the overhead of GDPR compliance.

credit card fraud

Fraud stories, Part 1

Welcome to Fraud Stories, a new blog focused on digital identity and online fraud, one of the most defining issues of our day.

Artificial intelligence and digital identity

The ABCs of Identity Management

Identity management tools provide IT managers with tools and technologies for controlling user access to critical information within an organization.

sort filter sift flour separate bake

The road to APIness in customer identity

Ditching the identity platform for a universal identity API approach. Using API recipes to build the identity ecosystem moving away from the static platform designs, to a world where identity and data components truly come together...

mobile device management

Is your cellphone number just as valuable as your social security number?

Recent news coverage has touted that cell phone numbers are just as valuable to hackers and identity thieves as Social Security Numbers. But, that's not the case at all.

Anonymized identity

The thorny issue of verifying humans

Customer identity access management and how verification of users is not working. A look at the concept of levels of assurance (LOA) as an integer based system that needs a rethink. How probability based identity is the way forward....

Game of Thrones

Banking's 'Valar Morghulis' moment

HBO's smash hit series features two-factor authentication in a way that should resonate for the young professionals most banks want to attract to their online services.

04 insider threat

How to spot and prevent insider threats

Are departing employees taking data with them? Here’s what you need to know about detecting insider threats and better protecting your enterprise network and proprietary information.

biometrics

The best identity management advice right now

We've never been closer to getting pervasive, global identities. And with 2FA/MFA, you get all of the benefit with less of the risk.

dirty numbers playground

Cybersecurity market research: Top 15 statistics for 2017

cybersecuity market statistics

name badges hello

Security leaders can unite the business around identity

Kevin Cunningham shares insights on why identity is a smart way to bring your business colleagues together to support security efforts

firewall hole

Third parties leave your network open to attacks

With the Target example as the high-water mark, enterprises need to worry about the lack of security on a third parties’ part. How do you tighten things up?

1 tracking hunting dogs horse

Pitfalls of identity access management

Whether dealing with a third parties access or tracking an insider through your network, action needs to be taken to see who goes where. Too few organizations treat IAM as the crucial, secure connective tissue between businesses'...

passwords

Security entrepreneur’s tiny hack-proof password computer

PasswordsFAST personal password manager product review

1 transform phone payment

10 ways Trusted Identities are used

It is always a struggle to control who gets into your network. A third-party might need access for the contractual work they are doing. HID Global runs through some ways trusted identities are used.

behavior facial expressions emotions

You can steal my identity, but not my behavior

The compromise and misuse of identity is at the core of modern threats and data breaches. This has been documented for years and continues to escalate. As a result, we are rapidly approaching the end of life for password-based...

sprint track runners

Security leaders need to sprint before getting forced to scramble

Udi Mokady shares insights on the changing nature of security threats and how a focused sprint now builds trust and sets the stage for future success

binoculars desert

Cybersecurity companies to watch

CBInsights created a list of startups that its metrics showed has early-to mid-stage high-momentum companies pioneering technology with the potential to transform cybersecurity. 

Load More