Identity Management

Identity Management | News, how-tos, features, reviews, and videos

CSO > Password elimination [conceptual password security lock in a trash bin]
file sharing / data sync / shared records / eliminating redundancy of multiple identities

facial recognition - biometric security identification

Why GE consolidated its identity and access management infrastructure

A multi-year effort to centralize GE's IAM functionality has resulted in significant cost savings, improved onboarding and better ability to meet regulatory requirements.

identity concept 164551610

Using citizen IDs for commercial services will take an identity ecosystem

Citizen identity systems like the UK’s Verify initiative are costly. It only makes sense to offset that cost by allowing commercial entities to utilize citizen IDs. Here's what it will take.

boxes box idea outside the box it as a product surprise unique masterzphotois getty

Self-sovereign identity: 3 key questions

SSI is on the extreme end of the digital identity spectrum. Its focus is putting control back in the hands of you, the user. But SSI is not the only way to skin a cat.

big brother privacy eye data breach security binary valerybrozhinsky getty

Have we reached peak privacy? How good IAM and privacy can coexist

Why privacy needs to remain at the forefront of identity and access management.

one lightbulb glowing among a pack of unlit bulbs

RSAC Innovation Sandbox 2019: Cloud, identity, application security take center stage

Take note of these startups. Innovation Sandbox has been around for 15 years. A whopping 42 percent of finalists from its first ten years have been acquired. Finalists in the past five years have received $1.5B in funding.

human weak link cybersecurity primary

What is a supply chain attack? Why you should be wary of third-party providers

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

blue green abstract finger print identity bio security fingerprint

15 secure coding practices to use in digital identity

Secure coding of any application or service is important, but it is vital in systems that process personal data.

women group colorful crowd diversity

Women in identity management: 4 newcomers to watch

Identity management veterans Diana Volere, Diane Joyce, Eve Maler and Susan Morrow introduce you to new entrants in the field.

8 authentication basics password identity protected security

Managing identity and access management in uncertain times

Emerging standards and frameworks such as Gartner CARTA, Zero Trust, NIST SP 800 and IDSA provide guidelines, but how organizations manage identity and access management in 2019 is what matters most.

eye binary retina scanner security identity access management

Microsoft, Mastercard propose universal digital identity program

Microsoft and Mastercard say the “single, reusable digital identity” could solve identity verification issues and help with fraud prevention.

blue green abstract finger print identity bio security fingerprint

IAM for IoT: Taming the internet of threats

We don’t simply give users credentials and allow unfettered access to the network, why wouldn't we apply the same controls to a networked device?

cloud security

3 top multi-cloud security challenges, and how to build a strategy

A number of security best practices have emerged alongside the growth of the multi-cloud environment, security experts say, and there are several critical steps that all organizations should take as they develop their own security...

Artificial intelligence and digital identity

What is IAM? Identity and access management explained

IAM products provide IT managers with tools and technologies for controlling user access to critical information within an organization.

login password - user permissions - administrative control

Using social media for authentication: 3 pitfalls to avoid

Logging into business systems with social accounts comes with certain risks. Here's what you need to know.

blockchain in healthcare / doctor accesses one block in a chain of digital medical records

Can digital identity cure the chronically ill?

A secure, verifiable digital identity for patients would improve communication and information sharing across multiple specialists and caregivers.

FinTech abstract / virtual world of dollars, pounds, euros, bitcoins, etc.

Open banking is coming to the U.S.: How secure will it be?

To protect customer data, open banking regulations in the U.S. must have teeth and enforcement.

login credential - user name, password - administrative controls

Review: Ping Identity brings identity management to cybersecurity defenses

Enterprise networks have grown too complex to easily manage all user credentials through something like Active Directory. And letting each individual app handle user logins creates silos that can become a security nightmare. The...

flow of digital data through virtual data center servers

How identity layering improves data flow

The layered approach for security is dead. Long live layered digital identity and identity in depth.

Load More
You Might Also Like