Identity Management

Identity Management news, information, and how-to advice

girl hands privacy stop
Man pointing to security icon for email

6 password

Ready for more secure authentication? Try these password alternatives and enhancements

Password-only authentication is dead. Combine passwords with multifactor authentication, social login, biometrics, or risk-based authentication to better protect users and your reputation.

open door with sunlight shining through

Feeling secure enough to use open source for IAM projects

Using open source software to add functionality to your IAM systems within a secure framework.

access computer through your phone skeleton key unlocking

How IAM can help move the finish line for hackers

Identity and access management can be leveraged by an enterprise to secure a network that might already be compromised. Here's how...

Anonymized identity

The Pentagon has a project that aims to verify identity via smartphone

A Pentagon-funded project that aims to add tech to verify identity and ultimately to assign a “risk score” to you could be included in new smartphones within two years.

social security card

Replacing the Social Security Number

Adopting a continuous "know your customer" (KYC) mentality.

facial recognition access identification biotech

Here, there, everywhere: How pervasive identity and access management transforms secure access

When users are as likely to be working on the go as at their desks, and applications are as likely to be in the cloud as on-premises, you need identity and access management everywhere.

number 4 four with binary grunge background

Why it’s time to break these 4 identity verification rules

Digital transformation of financial transactions combined with advances in fraud techniques are making these traditional approaches obsolete, as well as a barrier to online commerce.

keys authentication

How consumer omnichannel authentication benefits businesses

Consumers want the same authentication experience across all channels without the hassle of remembering passwords, pins, etc. Consumer omnichannel authentication is transforming businesses and providing key benefits, including...

security map digital encryption identity

Reduce cloud IT management headaches by approaching IAM the right way

Moving to the cloud has opened up new identity-related concerns and worries that we’ve never experienced before. The good news is businesses don’t have to fight the identity security battle on their own, and solutions, strategies and...

security map digital encryption identity

From NSTIC to improved federal identity, credential and access management

OMB’s ICAM policy change leverages NIST’s Digital Identity Guidelines permitting the use of non-PIV, AAL 3 credentials for logical access, and tasks agencies to accept federated credentials for consumers conducting transactions online....

cloud security ts

Cloud security will (and should) dominate the RSA Conference

Cloud computing is a runaway IT train, but cloud security is still messy and immature. RSA should become the place to go for cloud security vision, training, best practices, and technology leadership.

locks on binary code

Software-defined perimeter: Important initiative, ineffective name

A geeky and confusing name doesn’t communicate business, privacy, and security benefits. Instead of software-defined perimeter, I suggest ubiquitous security access services (USAS).

human weak link cybersecurity primary

What is a supply chain attack? Why you should be wary of third-party providers

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

RSA conference 2017

RSA Conference: CISOs' top 4 cybersecurity priorities

When cybersecurity executives head to the RSA Conference, they will be looking for information about threat intelligence, SOAPA, business risk, and changing security perimeters.

facial recognition - biometric security identification

Adopting a continuous KYC mentality

The expansion of digital payments presents new challenges for data security.

facial recognition - biometric security identification - binary face

How the Facebook privacy debacle is connected to the movement of IAM to containers

Trust by Design can help us to build better and safer IAM platforms where the privacy of personal data is respected.

keys to access solutions closure complete

Who owns identity and access management?

Learn the best practices for integrating identity management into your business while also staying ahead of cutting edge competition.

cloud security ts

The cloud’s the limit for secure, compliant identity storage and personal data

As we go forward into secure, compliant, digital identity-driven ecosystems, we need to understand how to get their security right.

Load More