Identity Management Solutions

Identity Management Solutions | News, how-tos, features, reviews, and videos

binary code flows around a corporate structure / cybersecurity / technology companies
One lock in a series is unlocked / weakness / vulnerability

A large 'X' marks a conceptual image of a password amid hexadecimal code.

How to review password quality in Active Directory

Regular reviews of the effectiveness of user, admin, and service passwords stored in Active Directory is a good idea. Here's how one password review tool works.

Windows security and protection [Windows logo/locks]

How to check for Active Directory Certificate Services misconfigurations

Recently discovered Microsoft Windows AD CS configuration errors could give attackers account and domain control. Here's how to audit AD CS for vulnerable configurations.

Artificial intelligence and digital identity

What is IAM? Identity and access management explained

IAM products provide IT managers with tools and technologies for controlling user access to critical information within an organization.

human weak link cybersecurity primary

Supply chain attacks show why you should be wary of third-party providers

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

infographic of cloudscape reflect to modern multicloud technology picture id1262031859 2

How one multicloud-based business manages security controls

AppsFlyer processes 80 terabytes of data a day across multiple cloud hosting services. It scales its security needs by keeping a close eye on identity governance and access controls.

open source box open box out of the box empty

Using open source for identity projects: 8 considerations

Consider these eight points to decide whether you can securely use open-source code in your identity management projects.

One avatar is uniquely identified among others at the center of a bullseye in a digital environment.

New US digital identity legislation promises more secure verification

COVID-19 has exposed the US’s lack of a comprehensive digital identity strategy. If passed, the Improving Digital Identity Act of 2020 will address this need through engagement among federal, state and local governments.

A mobile phone with virtual security framework overlay.

What the use of open banking means for identity networks

By connecting identity data from multiple sources through APIs, the open banking concept can help verify identity more reliably and improve the customer experience.

An obscured password is displayed on a monitor.

5 best practices to secure single sign-on systems

Don't assume that SSO is inherently secure. Follow these recommendations to prevent unauthorized access due to authentication flaws.

A laptop with a virtual overlay of abstract code and a binary skull.

Auth0 Signals analyzes logins to block bots

Auth0 Signals, a key component to the Auth0 identity management platform, analyzes login attempts against four key criteria to identify and block script-based or bot attacks.

Conceptual art: Creative collaboration while physically distancing during the COVID-19 pandemic.

Why COVID-19 will change identity management forever

Large job losses, more people working from home, and an increased use of freelancers and consultants are forcing companies to rethink their access control models.

A vast network of identity avatars. [identity management]

10 identity management metrics that matter

Monitoring these key identity and access management numbers will help you evaluate the performance of your IAM solution.

abstract face / digital identity

4 key problems with digital identity and why we need a new approach

To more accurately and more safely authenticate people online, digital identity needs to better cope with changes in people's lives. It's time to build identity technology for a digital life.

binary eye circuits

Authentication, identity management start-ups lead 2019 VC investing

Cybersecurity venture investments reached nearly $7 billion in 2019. Authentication and identity management start-ups were the top lures.

digital identity / authentication

What's ahead for digital identity in 2020?

Events of the past year have set up big changes for digital identity in 2020. Here's recap of what happened and what to expect this year.

silver platter passwords exposed authentication hacked vulnerable security breach

4 authentication use cases: Which protocol to use?

Choosing the wrong authentication protocol could undermine security and limit future expansion. These are the recommended protocols for common use cases.

access management / access control / user connections / identities

Flex streamlines app access for 20k suppliers with IAM overhaul

Contract manufacturer Flex dumped its distributed identity and access management system for a more centralized, cloud-based option that better protects data and intellectual property.

A binary mask.

Deepfakes and synthetic identity: More reasons to worry about identity theft

How can we maintain control over digital identity In a world where it is being blurred and abused by fraudsters?

Load More
You Might Also Like