Identity Management - Infoworld http://www.infoworld.com/t/2107 en German researchers hack Galaxy S5 fingerprint login http://www.infoworld.com/d/security/german-researchers-hack-galaxy-s5-fingerprint-login-240603?source=rss_identity_management <p>It took just four days for German researchers to trick the Samsung Galaxy S5's fingerprint scanner into accepting a mold of a fingerprint instead of a real finger.</p> <p>Despite fingerprint authentication being one of the headline features on Samsung's new flagship model, the company's implementation of it "leaves much to be desired," SRLabs said in a video demonstration of the hack <a href="http://www.youtube.com/watch?v=sfhLZZWBn5Q" target="_blank">posted on Youtube.</a></p> Mobile Technology Security Samsung Android Authentication Mobile Security Hacking Identity Management Smartphones Wed, 16 Apr 2014 13:53:02 +0000 admin 240603 at http://www.infoworld.com We need to move identity management to the cloud http://www.infoworld.com/d/cloud-computing/we-need-move-identity-management-the-cloud-238930?source=rss_identity_management <p>We've known for a while that centralized identity management provides a huge advantage when using complex and widely distributed systems. But who uses complex and widely distributed systems? Anyone who uses cloud computing, that's who.</p> <p>There are so many moving parts to a public, hybrid, or multicloud deployment that security is a nightmare. The ability to assign centralized identities to all these parts -- person, device, or data -- allows for more control, as well as more flexibility.</p> Cloud Computing Security Identity Management Fri, 28 Mar 2014 10:00:00 +0000 David Linthicum 238930 at http://www.infoworld.com You want to know who has access to what? Good luck http://www.infoworld.com/d/security/you-want-know-who-has-access-what-good-luck-239018?source=rss_identity_management <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/lock_screen.jpg" alt="You want to know who has access to what? Good luck" width="243" height="182" align="right" /><br /><em><p align="right">Credit: iStockphoto</p></em></div> Security Access Control Endpoint Protection Identity Management Security Tue, 25 Mar 2014 10:00:00 +0000 Roger A. Grimes 239018 at http://www.infoworld.com The bad guys have your credit card info -- so what? http://www.infoworld.com/d/security/the-bad-guys-have-your-credit-card-info-so-what-238558?source=rss_identity_management <div id="tw-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/IFW_Hacking3.jpg" alt="The bad guys have your credit card info -- so what?" width="243" height="182" align="right" /></div> <p>I'm constantly perplexed by the sensational headlines claiming this or that breach resulted in millions of credit cards being stolen.</p> Security Cyber Crime Data Security Hacking Identity Management Tue, 18 Mar 2014 10:00:00 +0000 Roger A. Grimes 238558 at http://www.infoworld.com Google, Microsoft, Salesforce back OpenID Connect -- but it's not enough http://www.infoworld.com/t/identity-management/google-microsoft-salesforce-back-openid-connect-its-not-enough-237258?source=rss_identity_management <div id="tw-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/Security_lock_2_hp.jpg" alt="Google, Microsoft, Salesforce back OpenID Connect -- but it's not enough" width="243" height="182" align="right" /></div> <p>After some four years of wrangling, the <a href="http://openid.net/">OpenID Foundation</a> has finally <a href="http://openid.net/2014/02/26/the-openid-foundation-launches-the-openid-connect-standard/">given the th Security Identity Management Security Standards Thu, 27 Feb 2014 11:00:00 +0000 InfoWorld Tech Watch 237258 at http://www.infoworld.com How to benefit from the identity data explosion http://www.infoworld.com/t/security/how-benefit-the-identity-data-explosion-236619?source=rss_identity_management <p><em>Week in and week out, big-name companies from Target to Neiman Marcus to Michaels learn the severe consequences of flawed data security. The truth is, even when IT has been armed with the latest security technology, defending against breaches isn't easy. In fact, as attacks get more and more sophisticated, it's getting harder.</em></p> Big Data Business Intelligence Security Access Control Big Data Identity Management Security Thu, 20 Feb 2014 11:00:00 +0000 New Tech Forum 236619 at http://www.infoworld.com Book smart, security stupid: Rogue professors flunk Security 101 http://www.infoworld.com/t/it-jobs/book-smart-security-stupid-rogue-professors-flunk-security-101-235176?source=rss_identity_management <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/18OPsecadvise_hp.jpg" alt="Book smart, security stupid: Rogue professors flunk Security 101" width="243" height="182" align="right" /></div><p>If anyone wants to study human nature, they should tag along with IT pros for a few days. We see it all, the many shades of good and bad.</p> your IT tales Access Control IT Jobs IT Management IT Training Application Security Tech Support Identity Management Wed, 29 Jan 2014 11:00:00 +0000 Anonymous 235176 at http://www.infoworld.com XML co-inventor: Now's the time for federated identity http://www.infoworld.com/t/identity-management/xml-co-inventor-nows-the-time-federated-identity-230826?source=rss_identity_management <div id="tw-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/02OPsecadvise_hp_0.jpg" alt="XML co-inventor: Now's the time for federated identity" width="243" height="182" align="right" /></div> <p>Rather than having Internet visitors maintain an easily forgettable bunch of passwords, Web application builders should use federated identity services, enabling users to have just a few passwords protected by entities with substantia</p> Security Application Development Identity Management Thu, 14 Nov 2013 11:00:00 +0000 InfoWorld Tech Watch 230826 at http://www.infoworld.com It's on -- cool heads meet fiery tempers in an IT turf war http://www.infoworld.com/t/it-jobs/its-cool-heads-meet-fiery-tempers-in-it-turf-war-230692?source=rss_identity_management <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/03FEsoa-hp_0.jpg" alt="It's on -- cool heads meet fiery tempers in an IT turf war" width="243" height="182" align="right" /></div><p>You know how some scenes stick with you?</p> Data Center Security your IT tales IT Jobs IT Management Data Security Identity Management Data Center Wed, 13 Nov 2013 11:00:00 +0000 Anonymous 230692 at http://www.infoworld.com Okta CEO: We're solving the identity management puzzle http://www.infoworld.com/t/identity-management/okta-ceo-were-solving-the-identity-management-puzzle-230554?source=rss_identity_management <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/Cloud_Security_hp.jpg" alt="Okta CEO: We're solving the identity management puzzle" width="243" height="182" align="right" /></div><p>Cloud and mobile have vastly expanded the surface area of computing. In doing so, they have expanded risk.</p> Security The Industry Standard IDGE CEO Interview Series Startups Identity Management Mon, 11 Nov 2013 11:00:00 +0000 Eric Knorr 230554 at http://www.infoworld.com 9 trends for 2014 and beyond http://www.infoworld.com/t/cloud-computing/9-trends-2014-and-beyond-230099?source=rss_identity_management <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/BigData440x330.jpg" alt="9 trends for 2014 and beyond" width="243" height="182" align="right" /></div><p>The year isn't over yet, but I've already reached my limit of trying to make sense of many new developments. So I'm ready to start the season of prognostication early. Originally, I figured I'd reel off some predictions about the coming year.</p> Big Data Cloud Computing Data Center Data Management HTML5 Mobile Technology Security Storage Application Development IaaS NoSQL PaaS SaaS SDN Identity Management Cloud Computing Mobile Technology Storage Mon, 04 Nov 2013 12:24:20 +0000 Eric Knorr 230099 at http://www.infoworld.com How to provision users in a cloud world http://www.infoworld.com/d/application-development/how-provision-users-in-cloud-world-227362?source=rss_identity_management <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/cloud_business_user.jpg" alt="Google's Project Loon stakes out no-NSA zone (we think)" width="243" height="182" align="right" /><br /><em><p align="right">Credit: byryo</p></em></div> Application Development Computer Hardware Security Application Development SaaS Identity Management Thu, 26 Sep 2013 10:00:00 +0000 Andrew Oliver 227362 at http://www.infoworld.com Red Hat Enterprise Linux gets cozy with MongoDB http://www.infoworld.com/d/security/red-hat-enterprise-linux-gets-cozy-mongodb-223696?source=rss_identity_management <p>Easing the path for organizations to launch big data-styled services, Red Hat has coupled the 10gen MongoDB data store to its new identity management package for the Red Hat Enterprise Linux (RHEL) distribution.</p> Open Source Software Security Red Hat Database Administration Identity Management Open Source Software Tue, 30 Jul 2013 15:04:08 +0000 admin 223696 at http://www.infoworld.com Active Directory heads to the cloud: What it does and doesn't do http://www.infoworld.com/d/microsoft-windows/active-directory-heads-the-cloud-what-it-does-and-doesnt-do-222847?source=rss_identity_management <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/Microsoft_Cloud_Efforts_hp.jpg" alt="TITLE" width="243" height="182" align="right" /></div><p>Windows Azure has been evolving steadily since its release in spring 2010, its pricing is now fairer, and useful third-party add-ons can be found in the Windows Azure Store.</p> Cloud Computing Data Center Microsoft Windows Security Active Directory Hybrid Cloud Identity Management Wed, 17 Jul 2013 10:00:00 +0000 J. Peter Bruzzese 222847 at http://www.infoworld.com Critical vulnerabilities found in SSO enterprise tool Atlassian Crowd http://www.infoworld.com/d/security/critical-vulnerabilities-found-in-sso-enterprise-tool-atlassian-crowd-221901?source=rss_identity_management <p>A critical vulnerability that could allow remote attackers to access sensitive enterprise log-in credentials and other data was fixed last week in Crowd, a single sign-on (SSO) and identity management tool used by large organizations to simplify access to their internal Web applications and services.</p> Security Authentication Identity Management Patch Management Vulnerability Assessment Mon, 01 Jul 2013 16:40:22 +0000 admin 221901 at http://www.infoworld.com Final arrangements: Hitting the digital dead man's switch http://www.infoworld.com/t/identity-management/final-arrangements-hitting-the-digital-dead-mans-switch-216456?source=rss_identity_management <div id="tw-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/IFW_Hacking.jpg" alt="Final arrangements: Hitting the digital dead man's switch" width="243" height="182" align="right" /></div> <p>The one part of our lives online that we need to do a lot more thinking about is our deaths online.</p> Google Identity Management Mon, 15 Apr 2013 10:00:00 +0000 InfoWorld Tech Watch 216456 at http://www.infoworld.com Dropbox to add single sign-on to attract businesses http://www.infoworld.com/d/cloud-computing/dropbox-add-single-sign-attract-businesses-216175?source=rss_identity_management <p>Dropbox, whose cloud storage and file-sharing application has been adopted by millions of consumers, will add single sign-on (SSO), its latest feature for businesses as it seeks to penetrate the workplace market.</p> <p>The company announced on Wednesday that its product will let IT departments tie it to their identity authentication systems. That way, IT departments will be able to include Dropbox in the set of applications that end-users log on to automatically when they sign in once with their main credentials.</p> Cloud Computing Consumerization of IT Security Storage Cloud Storage Identity Management Consumerization of IT Storage Wed, 10 Apr 2013 19:03:20 +0000 admin 216175 at http://www.infoworld.com Mozilla Persona privacy protections trump Facebook in single sign-on http://www.infoworld.com/t/identity-management/mozilla-persona-privacy-protections-trump-facebook-in-single-sign-216084?source=rss_identity_management <div id="tw-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/Persona.png" alt="Mozilla Persona privacy protections trump Facebook in single sign-on " width="243" height="182" align="right" /></div> <p>Mozilla today unveiled Persona Beta 2, the newest edition of the organization's open authentication system, designed to let users sign into Web apps and services without creating new user names and passwords.</p> Application Development Security Facebook Mozilla Twitter Application Development Identity Management Tue, 09 Apr 2013 18:15:52 +0000 InfoWorld Tech Watch 216084 at http://www.infoworld.com Security will get worse before it gets better http://www.infoworld.com/d/security/security-will-get-worse-it-gets-better-214327?source=rss_identity_management <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/Security_web_1_hp.jpg" alt="Security will get worse before it gets better" width="243" height="182" align="right" /></div><p>One day we will get the safer Internet we deserve. The question is: How much more damage needs to occur before we that happens?</p> Security Cyber Crime Identity Management Malware Security Tue, 12 Mar 2013 10:00:00 +0000 Roger A. Grimes 214327 at http://www.infoworld.com Identity fraud in U.S. reaches highest level in three years http://www.infoworld.com/d/security/identity-fraud-in-us-reaches-highest-level-in-three-years-213199?source=rss_identity_management <p>U.S. consumers experienced the highest level of identity theft in three years in 2012, although much of the fraud losses were absorbed by banks and merchants, according to a new survey.</p> <p>Incidents of identity fraud affected 5.26 percent of U.S. adults last year, according to a survey of 5,249 people by Javelin Strategy and Research. That's up from 4.9 percent in 2011 and 4.35 percent in 2010. The company put the total number of identity victims in 2012 at 12.6 million.</p> Security Cyber Crime Data Security Identity Management Thu, 21 Feb 2013 12:03:19 +0000 admin 213199 at http://www.infoworld.com