Identity Management

Identity Management news, information, and how-to advice

cloud management
retinal identity scan 42 15483589

Anit Yoran

RSA chief to security pros: Stop addressing the wrong problems

RSA President Amit Yoran offers up a five-point plan to deal with the new security environment

Artificial intelligence and digital identity

Online identity: Where collaboration and innovation get stuck

Innovation and collaboration go together, but to work together across platforms we need an independent identity scheme over which users have full control

Private property

Doxxing defense: Remove your personal info from data brokers

Don't want your home address or other personal info published to the world? This weekend, take an hour or two to make yourself a less visible target

securetaxes primary

FBI probes for source of fraudulent TurboTax filing spike

There has been a significant increase in fraudulent tax returns so far this year using Intuit's tax preparation software

Security group plans for a future without passwords

The FIDO Alliance encourages stronger use of biometrics and hardware tokens instead of passwords to identify users

Critical Bugzilla vulnerability could give hackers access to undisclosed software flaws

Software projects that use the Bugzilla bug tracking software should deploy the latest patches immediately, security researchers said

A look at the FBI’s big, bad identification system

Next Generation Identification uses a variety of high-tech tools and algorithms to deal with criminal behavior

Fear the golden ticket attack!

Be afraid of the golden ticket attack -- if malicious hackers can create the tickets, they can wreak whatever havoc they please

Update: IBM focuses on identity management with Lighthouse buy

The Lighthouse acquisition will bring IBM the ability to offer identity management as a service

IBM buys access control and identity management firm CrossIdeas

With CrossIdeas, IBM is gaining auditing tools for policing segregation-of-duties violations across disparate systems

German researchers hack Galaxy S5 fingerprint login

The integration with Paypal makes the weakness of Samsung's authentication implementation extra serious

The worst data breaches of 2014 ... so far

We're only a third of the way through the year, and hackers have already had their way with all matter of security systems

We need to move identity management to the cloud

Centralized identity management in the cloud is a very good idea, but it'll go nowhere until IT resistance ends

You want to know who has access to what? Good luck

Access control sounds simple, until you try to tease out rights and permissions for every user in your environment

The bad guys have your credit card info -- so what?

Cyber criminals can already access your financial data, and credit card breaches can be beneficial in the long run

Google, Microsoft, Salesforce back OpenID Connect -- but it's not enough

Despite big-name support, newly finalized OpenID Connect protocol is a security building block, not a silver bullet

How to benefit from the identity data explosion

Everyone wants to avoid being the next Target. Brian Milas, CTO at Courion, explains how to use the rich data generated by identity and access control solutions to reduce risk

Book smart, security stupid: Rogue professors flunk Security 101

Two academics betray highly ill-advised security practices when using the university's computer network

Load More