Identity Management

Identity Management | News, how-tos, features, reviews, and videos

eye binary retina scanner security identity access management
blue green abstract finger print identity bio security fingerprint

cloud security

3 top multi-cloud security challenges, and how to build a strategy

A number of security best practices have emerged alongside the growth of the multi-cloud environment, security experts say, and there are several critical steps that all organizations should take as they develop their own security...

Artificial intelligence and digital identity

What is IAM? Identity and access management explained

IAM products provide IT managers with tools and technologies for controlling user access to critical information within an organization.

login password - user permissions - administrative control

Using social media for authentication: 3 pitfalls to avoid

Logging into business systems with social accounts comes with certain risks. Here's what you need to know.

blockchain in healthcare / doctor accesses one block in a chain of digital medical records

Can digital identity cure the chronically ill?

A secure, verifiable digital identity for patients would improve communication and information sharing across multiple specialists and caregivers.

FinTech abstract / virtual world of dollars, pounds, euros, bitcoins, etc.

Open banking is coming to the U.S.: How secure will it be?

To protect customer data, open banking regulations in the U.S. must have teeth and enforcement.

login credential - user name, password - administrative controls

Review: Ping Identity brings identity management to cybersecurity defenses

Enterprise networks have grown too complex to easily manage all user credentials through something like Active Directory. And letting each individual app handle user logins creates silos that can become a security nightmare. The...

flow of digital data through virtual data center servers

How identity layering improves data flow

The layered approach for security is dead. Long live layered digital identity and identity in depth.

race compet starting sucess leader prepar challenge

Start preparing today for the future of quantum computing

With so many issues competing for an IT security professional's time, it’s difficult to find time for future planning. That being said, now is the time of professionals to have quantum computing on the radar.

eye retina scanner security identity access management

The best IAM software: Rating the top 10 products

Based on feedback from IT professionals, these are the best identity and access management products. Download the free PDF report to see how they rank from 1 to 10.

facial recognition - biometric security identification

3 IAM deployment models: Which will work for your organization?

Each of the identity and access management platform deployment models--on-premises, cloud and hybrid--has trade-offs and different resource requirements.

Artificial intelligence and digital identity

Is it time to drop our identity to become frictionless?

How the data behind the identity is driving services and will help move us away from knowledge-based verification.

digital twins woman in profile ai mirror duplicate duo pair

Building relationships using digital identity

The how and why of building an identity platform based on reciprocal altruism.

donuts primary

Getting to know you: How continuous identity and access management transforms secure access

Better access decisions come from authentication solutions that work constantly to get to know users and resources better and better over time.

03 cryptography

How to improve your crypto-agility

As the sheer number of connected devices continues to rise, securing these devices, and becoming “crypto agile” is a key component of an organization’s effort to become more agile. Read on to discover how to improve your...

Audience at Black Hat Conference

Anticipating Black Hat USA 2018

Looking forward to learning more about new developments in artificial intelligence, cloud security, enterprise risk management, and lots of other topics

google cloud services

Google intends to make GCP the most secure cloud platform

If Google wants the world to know how secure Google Cloud Platform is and increase adoption, it must educate the market and turn up the competitive fire.

facial recognition - biometric security identification

DAM if you do and DAM if you don’t

How Digital Asset Management and identity management are perfect partners.

facial recognition - biometric security identification

Identity eats security: How identity management is driving security

New intelligent identity management systems are changing the way organizations authenticate users and devices, and they’re making identity the new security perimeter.

Load More