Identity Management

Identity Management | News, how-tos, features, reviews, and videos

Private property

Doxxing defense: Remove your personal info from data brokers

Don't want your home address or other personal info published to the world? This weekend, take an hour or two to make yourself a less visible target

securetaxes primary

FBI probes for source of fraudulent TurboTax filing spike

There has been a significant increase in fraudulent tax returns so far this year using Intuit's tax preparation software

Security group plans for a future without passwords

The FIDO Alliance encourages stronger use of biometrics and hardware tokens instead of passwords to identify users

29 tips for succeeding as an independent developer

Find out how to cut corporate ties and transform your coding chops into a thriving business that can go the distance

Critical Bugzilla vulnerability could give hackers access to undisclosed software flaws

Software projects that use the Bugzilla bug tracking software should deploy the latest patches immediately, security researchers said

A look at the FBI’s big, bad identification system

Next Generation Identification uses a variety of high-tech tools and algorithms to deal with criminal behavior

Liquid computing: The next wave of the mobile experience

The traditional enterprise workflow is ripe for huge change as the focus moves away from working in a single context on a single device to the workflow being portable and contextual

The care and feeding of a rockstar developer

Whether you're a hiring company, an educator, or a developer, find out what you're up against in the war for programming talent

The beginner's guide to Docker

Dig into Docker, the red-hot open source framework, from getting started to services you can use right now to the company's direction, in this downloadable PDF

Digital Spotlight: Cloud Security

The scalability of cloud computing depends on sharing resources that were never shared before, creating a new set of risks and demanding a new set of security best practices

Special report: The triumph of JavaScript

JavaScript is the reigning programming language across platforms and devices. Harness that power with the right frameworks and tools

Download the Hadoop Deep Dive

Businesses are using Hadoop across low-cost hardware clusters to find meaningful patterns in unstructured data. In this in-depth PDF, InfoWorld explains how Hadoop works and how you can reap its benefits

Download the HTML5 Strategy Deep Dive

Preparing your website and Web apps for HTML5? Here's what you need to know

Download the Cloud Security Deep Dive

The scalability of cloud computing depends on sharing resources that were never shared before, creating a new set of risks -- and demanding a new set of security best practices

Update: IBM focuses on identity management with Lighthouse buy

The Lighthouse acquisition will bring IBM the ability to offer identity management as a service

IBM buys access control and identity management firm CrossIdeas

With CrossIdeas, IBM is gaining auditing tools for policing segregation-of-duties violations across disparate systems

German researchers hack Galaxy S5 fingerprint login

The integration with Paypal makes the weakness of Samsung's authentication implementation extra serious

The worst data breaches of 2014 ... so far

We're only a third of the way through the year, and hackers have already had their way with all matter of security systems

We need to move identity management to the cloud

Centralized identity management in the cloud is a very good idea, but it'll go nowhere until IT resistance ends

Google, Microsoft, Salesforce back OpenID Connect -- but it's not enough

Despite big-name support, newly finalized OpenID Connect protocol is a security building block, not a silver bullet

Load More