Identity Management

Identity Management news, information, and how-to advice

Security group plans for a future without passwords

The FIDO Alliance encourages stronger use of biometrics and hardware tokens instead of passwords to identify users

Critical Bugzilla vulnerability could give hackers access to undisclosed software flaws

Software projects that use the Bugzilla bug tracking software should deploy the latest patches immediately, security researchers said


A look at the FBI’s big, bad identification system

Next Generation Identification uses a variety of high-tech tools and algorithms to deal with criminal behavior

Fear the golden ticket attack!

Be afraid of the golden ticket attack -- if malicious hackers can create the tickets, they can wreak whatever havoc they please

Update: IBM focuses on identity management with Lighthouse buy

The Lighthouse acquisition will bring IBM the ability to offer identity management as a service

IBM buys access control and identity management firm CrossIdeas

With CrossIdeas, IBM is gaining auditing tools for policing segregation-of-duties violations across disparate systems

German researchers hack Galaxy S5 fingerprint login

The integration with Paypal makes the weakness of Samsung's authentication implementation extra serious

The worst data breaches of 2014 ... so far

We're only a third of the way through the year, and hackers have already had their way with all matter of security systems

We need to move identity management to the cloud

Centralized identity management in the cloud is a very good idea, but it'll go nowhere until IT resistance ends

You want to know who has access to what? Good luck

Access control sounds simple, until you try to tease out rights and permissions for every user in your environment

The bad guys have your credit card info -- so what?

Cyber criminals can already access your financial data, and credit card breaches can be beneficial in the long run

Google, Microsoft, Salesforce back OpenID Connect -- but it's not enough

Despite big-name support, newly finalized OpenID Connect protocol is a security building block, not a silver bullet

How to benefit from the identity data explosion

Everyone wants to avoid being the next Target. Brian Milas, CTO at Courion, explains how to use the rich data generated by identity and access control solutions to reduce risk

Book smart, security stupid: Rogue professors flunk Security 101

Two academics betray highly ill-advised security practices when using the university's computer network

The weirdest, wackiest, and coolest sci/tech stories of 2013

From bathroom malware and the mystery Google barge to Chinese Moon landings and humanoid robots, it has been one crazy year in high-tech

XML co-inventor: Now's the time for federated identity

Google's Tim Bray proposes an alternative to the clunky practice of choosing and maintaining multiple passwords

It's on -- cool heads meet fiery tempers in an IT turf war

A bank's new IT team keeps calm and carries on against in-house challenges by more than one enraged party

Okta CEO: We're solving the identity management puzzle

Todd McKinnon explains how his startup, Okta, provides customers with centralized access control for thousands of cloud applications -- and now on-premise apps as well

9 trends for 2014 and beyond

Who says enterprise IT is boring? Big ideas and bold new tech are shaking things up like never before, so it's time to consider the long-term implications

How to provision users in a cloud world

When subscribing to multiple SaaS offerings serving many users, it gets complicated quickly. Here's how to address the problem now and in the future

Load More