Identity Management Solutions

Identity Management Solutions | News, how-tos, features, reviews, and videos

29 tips for succeeding as an independent developer

Find out how to cut corporate ties and transform your coding chops into a thriving business that can go the distance

Critical Bugzilla vulnerability could give hackers access to undisclosed software flaws

Software projects that use the Bugzilla bug tracking software should deploy the latest patches immediately, security researchers said

Liquid computing: The next wave of the mobile experience

The traditional enterprise workflow is ripe for huge change as the focus moves away from working in a single context on a single device to the workflow being portable and contextual

The care and feeding of a rockstar developer

Whether you're a hiring company, an educator, or a developer, find out what you're up against in the war for programming talent

The beginner's guide to Docker

Dig into Docker, the red-hot open source framework, from getting started to services you can use right now to the company's direction, in this downloadable PDF

Digital Spotlight: Cloud Security

The scalability of cloud computing depends on sharing resources that were never shared before, creating a new set of risks and demanding a new set of security best practices

Special report: The triumph of JavaScript

JavaScript is the reigning programming language across platforms and devices. Harness that power with the right frameworks and tools

Download the Hadoop Deep Dive

Businesses are using Hadoop across low-cost hardware clusters to find meaningful patterns in unstructured data. In this in-depth PDF, InfoWorld explains how Hadoop works and how you can reap its benefits

Download the HTML5 Strategy Deep Dive

Preparing your website and Web apps for HTML5? Here's what you need to know

Download the Cloud Security Deep Dive

The scalability of cloud computing depends on sharing resources that were never shared before, creating a new set of risks -- and demanding a new set of security best practices

Update: IBM focuses on identity management with Lighthouse buy

The Lighthouse acquisition will bring IBM the ability to offer identity management as a service

The Azure-Active Directory connection just got easier

Microsoft releases AAD Connect, a new wizard-driven tool to help ease the connection

IBM buys access control and identity management firm CrossIdeas

With CrossIdeas, IBM is gaining auditing tools for policing segregation-of-duties violations across disparate systems

German researchers hack Galaxy S5 fingerprint login

The integration with Paypal makes the weakness of Samsung's authentication implementation extra serious

We need to move identity management to the cloud

Centralized identity management in the cloud is a very good idea, but it'll go nowhere until IT resistance ends

Google, Microsoft, Salesforce back OpenID Connect -- but it's not enough

Despite big-name support, newly finalized OpenID Connect protocol is a security building block, not a silver bullet

How to benefit from the identity data explosion

Everyone wants to avoid being the next Target. Brian Milas, CTO at Courion, explains how to use the rich data generated by identity and access control solutions to reduce risk

Friends don't let friends migrate Active Directory alone

Even with the right vendor tools, domain renaming is fraught with gotchas. Turn to the IT community for help getting the job done

Book smart, security stupid: Rogue professors flunk Security 101

Two academics betray highly ill-advised security practices when using the university's computer network

XML co-inventor: Now's the time for federated identity

Google's Tim Bray proposes an alternative to the clunky practice of choosing and maintaining multiple passwords

Load More
You Might Also Like