Identity Management

Identity Management news, information, and how-to advice

Victim of identity theft
vendetta conspiracy masks costume

How identity-defined security hardens the soft center

Today’s identity platforms are taking security beyond passwords and perimeter protection to continuous, intelligent authorization based on context

cloud management

Identity management in the cloud goes beyond security

Here are the best practices to adopt for IAM as you move to the cloud

retinal identity scan 42 15483589

Google IDs are creeping into your identity management

Microsoft and Google are both expanding their policy management tools' reach, and IT may be caught in the middle

Anit Yoran

RSA chief to security pros: Stop addressing the wrong problems

RSA President Amit Yoran offers up a five-point plan to deal with the new security environment

Artificial intelligence and digital identity

Online identity: Where collaboration and innovation get stuck

Innovation and collaboration go together, but to work together across platforms we need an independent identity scheme over which users have full control

Private property

Doxxing defense: Remove your personal info from data brokers

Don't want your home address or other personal info published to the world? This weekend, take an hour or two to make yourself a less visible target

securetaxes primary

FBI probes for source of fraudulent TurboTax filing spike

There has been a significant increase in fraudulent tax returns so far this year using Intuit's tax preparation software

Security group plans for a future without passwords

The FIDO Alliance encourages stronger use of biometrics and hardware tokens instead of passwords to identify users

Critical Bugzilla vulnerability could give hackers access to undisclosed software flaws

Software projects that use the Bugzilla bug tracking software should deploy the latest patches immediately, security researchers said

A look at the FBI’s big, bad identification system

Next Generation Identification uses a variety of high-tech tools and algorithms to deal with criminal behavior

Fear the golden ticket attack!

Be afraid of the golden ticket attack -- if malicious hackers can create the tickets, they can wreak whatever havoc they please

Update: IBM focuses on identity management with Lighthouse buy

The Lighthouse acquisition will bring IBM the ability to offer identity management as a service

IBM buys access control and identity management firm CrossIdeas

With CrossIdeas, IBM is gaining auditing tools for policing segregation-of-duties violations across disparate systems

German researchers hack Galaxy S5 fingerprint login

The integration with Paypal makes the weakness of Samsung's authentication implementation extra serious

The worst data breaches of 2014 ... so far

We're only a third of the way through the year, and hackers have already had their way with all matter of security systems

We need to move identity management to the cloud

Centralized identity management in the cloud is a very good idea, but it'll go nowhere until IT resistance ends

You want to know who has access to what? Good luck

Access control sounds simple, until you try to tease out rights and permissions for every user in your environment

The bad guys have your credit card info -- so what?

Cyber criminals can already access your financial data, and credit card breaches can be beneficial in the long run

Load More