Identity Management Solutions
Identity Management Solutions | News, how-tos, features, reviews, and videos
Attivo Networks expands Active Directory protection
Domain Controller solution guards against bad behavior from unmanaged devices.
Active Directory security updates: What you need to know
These Active Directory updates address critical privilege bypass and elevation vulnerabilities. Implement them now if you can.
Supply chain attacks show why you should be wary of third-party providers
The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.
How to hack a phone: 7 common attack methods explained
Mobile security often beats PCs, but users can still be fooled and smartphones can still be hacked. Here’s what you need to watch for.
One Identity acquires OneLogin in bid to offer consolidated IAM suite
In a move to offer its customers a consolidated suite of security applications, One Identity has acquired OneLogin, an IAM (identity and access management) provider, adding to its own set of PAM (privileged access management, IGA...
The 10 most powerful cybersecurity companies
What makes these 10 security vendors the biggest power players? We break it down.
6 vulnerabilities Microsoft hasn't patched (or can't)
Your IT and security admins need to be aware of these unpatched Microsoft vulnerabilities so that they can mitigate them in other ways.
How to review password quality in Active Directory
Regular reviews of the effectiveness of user, admin, and service passwords stored in Active Directory is a good idea. Here's how one password review tool works.
How to check for Active Directory Certificate Services misconfigurations
Recently discovered Microsoft Windows AD CS configuration errors could give attackers account and domain control. Here's how to audit AD CS for vulnerable configurations.
What is IAM? Identity and access management explained
IAM is a set of processes, policies, and tools for controlling user access to critical information within an organization.
How one multicloud-based business manages security controls
AppsFlyer processes 80 terabytes of data a day across multiple cloud hosting services. It scales its security needs by keeping a close eye on identity governance and access controls.
Using open source for identity projects: 8 considerations
Consider these eight points to decide whether you can securely use open-source code in your identity management projects.
New US digital identity legislation promises more secure verification
COVID-19 has exposed the US’s lack of a comprehensive digital identity strategy. If passed, the Improving Digital Identity Act of 2020 will address this need through engagement among federal, state and local governments.
What the use of open banking means for identity networks
By connecting identity data from multiple sources through APIs, the open banking concept can help verify identity more reliably and improve the customer experience.
5 best practices to secure single sign-on systems
Don't assume that SSO is inherently secure. Follow these recommendations to prevent unauthorized access due to authentication flaws.
Auth0 Signals analyzes logins to block bots
Auth0 Signals, a key component to the Auth0 identity management platform, analyzes login attempts against four key criteria to identify and block script-based or bot attacks.
Why COVID-19 will change identity management forever
Large job losses, more people working from home, and an increased use of freelancers and consultants are forcing companies to rethink their access control models.
Tech Primer
What it takes to become an information assurance analyst
This in-demand role calls for a rare combination of superior communication skills and security chops. Learn how one information assurance analyst landed his current job, the skills and training that helped him get there, and where his...