Identity Management

Identity Management | News, how-tos, features, reviews, and videos

digital twins woman in profile ai mirror duplicate duo pair
donuts primary

03 cryptography

How to improve your crypto-agility

As the sheer number of connected devices continues to rise, securing these devices, and becoming “crypto agile” is a key component of an organization’s effort to become more agile. Read on to discover how to improve your...

Audience at Black Hat Conference

Anticipating Black Hat USA 2018

Looking forward to learning more about new developments in artificial intelligence, cloud security, enterprise risk management, and lots of other topics

google cloud services

Google intends to make GCP the most secure cloud platform

If Google wants the world to know how secure Google Cloud Platform is and increase adoption, it must educate the market and turn up the competitive fire.

facial recognition - biometric security identification

DAM if you do and DAM if you don’t

How Digital Asset Management and identity management are perfect partners.

facial recognition - biometric security identification

Identity eats security: How identity management is driving security

New intelligent identity management systems are changing the way organizations authenticate users and devices, and they’re making identity the new security perimeter.

crowd of sports spectators seamless 164455698

Legalizing online sports betting means a new need for security

In the wake of SCOTUS paving the way to legalizing online sports betting in the U.S., states are figuring out the best approach to making it secure with authentication and identity verification.

facial recognition access identification biotech

Strength in knowledge: How connected identity and access management transforms secure access

Connecting systems and sharing intelligence are key to fighting cybercrime—because even the most robust identity and access management solution can’t do it alone.

Network World: IoT Hacks [slide-06] > Lateral Attacks > Network access via a single breach point

Security versus usability a conundrum in modern identity management?

Convenience and usability vs. security when dealing with a valuable verified identity.

login credential - user name, password - administrative controls

The great identity re-architecture: enabling trust and interoperable credentials

What happens to all of the consumer and employees accounts online that are created but seldom used? Today digital identity information is replicating faster than the plastic waste in our landfills and oceans, and the harmful side...

facial recognition - biometric security identification - binary face

Connecting ABAC to identity governance and administration to extend access control capabilities

Enterprises need an approach to improve synergies between existing IAM technologies.

1 fake profile

Why we need to be worried about deepfake videos

The potential security threat of realistic fake videos of people doing and saying things they never did is cause for concern. Learn why and how they were developed, the risk they might represent when they spill beyond the world of...

girl hands privacy stop

The costs, the privacy and the security of IAM and personal data sharing

Resolving the issues of data storage and security when implementing life management platforms.

Man pointing to security icon for email

When your career is derailed by your girlfriend tampering with your email

Eric Abramovitz, a gifted clarinetist, had opportunity squandered when his girlfriend executed a classic "business email compromise."

6 password

Ready for more secure authentication? Try these password alternatives and enhancements

Password-only authentication is dead. Combine passwords with multifactor authentication, social login, biometrics, or risk-based authentication to better protect users and your reputation.

open door with sunlight shining through

Feeling secure enough to use open source for IAM projects

Using open source software to add functionality to your IAM systems within a secure framework.

access computer through your phone skeleton key unlocking

How IAM can help move the finish line for hackers

Identity and access management can be leveraged by an enterprise to secure a network that might already be compromised. Here's how...

Anonymized identity

The Pentagon has a project that aims to verify identity via smartphone

A Pentagon-funded project that aims to add tech to verify identity and ultimately to assign a “risk score” to you could be included in new smartphones within two years.

social security card

Replacing the Social Security Number

Adopting a continuous "know your customer" (KYC) mentality.

Load More