Identity Management

Identity Management news, information, and how-to advice

harry potter wizards logo

Biometrics and blockchains: the Horcrux protocol [part 3]

In this third and final article of the series, I discuss a new idea that will securely link your biometrics and online identity credentials via blockchain technologies.

2 token authentication locks

Identity management to-do list aligns with cybersecurity

Large organizations want to monitor user activities, move to multi-factor authentication, and get security more involved with IAM decisions.

Internet of things face

The internet of identities is coming and will bring massive IAM changes

New demands for scale, security and machine learning will support massive proliferation of internet-connected devices.

lg v30 camera hold

Image management in identity management: a picture paints a thousand words

Image management can give us the tools to secure and optimize image-based PII.

laptop theft thief

Getting rid of social security numbers is not the answer

It doesn’t matter what the data is, whether it’s a nine-digit number, a biometric marker or a barcode you carry with you at all times – if it’s not protected with the highest level of security available, it’s just another item for...

keys authentication

Security Myths: Users hate multifactor authentication

Just stop bludgeoning them with multifactor authentication (MFA).

Blockchain graphic

Trust and the blockchain: a marriage made in heaven, or a divorce waiting to happen?

The story of a blockchain that may not break, but will bend.

death darkness dark hood hooded

3 scary tech spooks and how to protect yourself

In this technology-dependent world, it’s no surprise we often come into contact with many threats and scams, but you don’t have to fall victim to them. Check out the top 3 tech spooks I’ve had to deal with, and my recommendations for...

access computer through your phone skeleton key unlocking

Big picture security

Context and risk aware access control promises to make our industry more likeable.


When big data gets personal...and cloudy

What are the considerations for security and scalability when choosing cloud storage for identity platforms that service multiple millions, even billions of users?

smartphone mobile identity thinkstock 501916953

Biometrics and blockchains: Why identity matters [part 2]

One of the most common new applications for blockchains is digital identity. Today, your passport, driver’s license, birth certificate and other forms of identity are recorded primarily on paper, kept on your person or in filing...

cybersecurity ts

5 worst cybersecurity habits with catastrophic consequences

These cybersecurity habits can have devastating effects. Make sure you — and your employees — aren't following them.

lock circuit board bullet hole computer security breach

Equifax: A teaching opportunity

Equifax did just about everything wrong. Here's what's going to happen because of it.


The time for convergence Is now

Until today, anti-fraud, security and authentication activities in organizations have operated as largely-separate domains, with IT ops even more separated, in most cases. It won't be easy, but convergences is going to happen, and...

door locks

Authenticating your customers: the tripartite of consumer authentication

Things to consider when choosing which authentication options to offer in identity systems for wide demographics. How the mix of security, usability, and customer attitude affects that choice.

fingerprint biometric security privacy

Identity data in the world of GDPR

The GDPR says that “The processing of personal data should be designed to serve mankind.“ How CIAM identity systems can help serve some of the privacy requirements of GDPR.

Which privileged identity management tools work best?

Discover what real users think of privileged identity management solutions

face superimposed on keyboard privacy hacker

Another day, another case of Grand Theft Data. Can a verified ID save the day?

How verified consumer identity can prevent mass-hacks like Equifax and others. Verified identity can be used alongside other technologies – such as blockchain, and anonymization – to prevent the exposure of data across multiple online...

phishing threat

Back to school, part 2: no whaling allowed!

5 security safeguards to keep the CEO out of hot water.

Tablet with lock showing secure encryption

Enhancing API security: dynamic authorization to protect sensitive data

APIs that handle sensitive data pose security and data access control threats, require advanced security solutions. API Gateways effectively manage the authentication of the user and provide service orchestration capabilities. But if...

Load More