Identity Management

Identity Management | News, how-tos, features, reviews, and videos

cloud security ts

Cloud security will (and should) dominate the RSA Conference

Cloud computing is a runaway IT train, but cloud security is still messy and immature. RSA should become the place to go for cloud security vision, training, best practices, and technology leadership.

locks on binary code

Software-defined perimeter: Important initiative, ineffective name

A geeky and confusing name doesn’t communicate business, privacy, and security benefits. Instead of software-defined perimeter, I suggest ubiquitous security access services (USAS).

human weak link cybersecurity primary

What is a supply chain attack? Why you should be wary of third-party providers

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

RSA conference 2017

RSA Conference: CISOs' top 4 cybersecurity priorities

When cybersecurity executives head to the RSA Conference, they will be looking for information about threat intelligence, SOAPA, business risk, and changing security perimeters.

facial recognition - biometric security identification

Adopting a continuous KYC mentality

The expansion of digital payments presents new challenges for data security.

facial recognition - biometric security identification - binary face

How the Facebook privacy debacle is connected to the movement of IAM to containers

Trust by Design can help us to build better and safer IAM platforms where the privacy of personal data is respected.

keys to access solutions closure complete

Who owns identity and access management?

Learn the best practices for integrating identity management into your business while also staying ahead of cutting edge competition.

cloud security ts

The cloud’s the limit for secure, compliant identity storage and personal data

As we go forward into secure, compliant, digital identity-driven ecosystems, we need to understand how to get their security right.

biometric security retina scan

Self-sovereign biometrics and the future of digital identity

Could we travel without passport or any documents? Our biometrics hold the key to efficient, safer and more secure travel in the future according to a 2018 World Economic Forum report.

facial recognition - biometric security identification - binary face

Thinking about identity management for the RSA Security Conference

Password elimination, software-defined perimeter, and the need for security to “own” identity should be highlighted at the RSA Conference.

vulnerable balance egg risk breach security

Striking a balance between customer experience, security and privacy

Everyone is a consumer with Consumer Identity and Access Management (CIAM).

keys authentication

The path to modern authentication and cybersecurity is pervasive, connected and continuous

What makes secure access truly secure today? Authentication that works seamlessly – everywhere, all the time.

What’s on CISOs Minds in 2018?

Business risk, the cyber supply chain, attackers, data security and awareness training top the list

Smart city internet of things with security camera

Identity and the smart city

IAMs next big outing.

continuous authentication

What is access control? 5 enforcement challenges security professionals need to know

Access controls authenticate and authorize individuals to access the information they are allowed to see and use.

facial recognition - biometric security identification - binary face

Cloud computing chaos is driving identity management changes

Cloud and mobility are exacerbating problems in an already-fragile IAM infrastructure. This will drive changes to single sign-on, multi-factor authentication, IAM centralization, and skills.

laptop security breach password identity theft hacker

Cybercriminals impersonate Outlook and DocuSign to steal your identity

Attackers are now impersonating popular web services like Microsoft Outlook, DocuSign and Google Docs to trick you to freely give up your credentials.

hand connect binary access

Transforming secure access to take on today’s cyber threats

Last year, 81% of cyber attacks involved compromised passwords—up from 63% the previous year. How much worse can it get? Let’s not wait around to find out.

eliminate insider threats 1

Are you you?

Are insiders really threats or part of the solution?

Artificial intelligence and digital identity

What is IAM? Identity and access management explained

IAM products provide IT managers with tools and technologies for controlling user access to critical information within an organization.

Load More