Identity Management

Identity Management news, information, and how-to advice

keys to access solutions closure complete
cloud security ts

biometric security retina scan

Self-sovereign biometrics and the future of digital identity

Could we travel without passport or any documents? Our biometrics hold the key to efficient, safer and more secure travel in the future according to a 2018 World Economic Forum report.

facial recognition - biometric security identification - binary face

Thinking about identity management for the RSA Security Conference

Password elimination, software-defined perimeter, and the need for security to “own” identity should be highlighted at the RSA Conference.

vulnerable balance egg risk breach security

Striking a balance between customer experience, security and privacy

Everyone is a consumer with Consumer Identity and Access Management (CIAM).

keys authentication

The path to modern authentication and cybersecurity is pervasive, connected and continuous

What makes secure access truly secure today? Authentication that works seamlessly – everywhere, all the time.

What’s on CISOs Minds in 2018?

Business risk, the cyber supply chain, attackers, data security and awareness training top the list

Smart city internet of things with security camera

Identity and the smart city

IAMs next big outing.

continuous authentication

What is access control? 5 enforcement challenges security professionals need to know

Access controls authenticate and authorize individuals to access the information they are allowed to see and use.

facial recognition - biometric security identification - binary face

Cloud computing chaos is driving identity management changes

Cloud and mobility are exacerbating problems in an already-fragile IAM infrastructure. This will drive changes to single sign-on, multi-factor authentication, IAM centralization, and skills.

laptop security breach password identity theft hacker

Cybercriminals impersonate Outlook and DocuSign to steal your identity

Attackers are now impersonating popular web services like Microsoft Outlook, DocuSign and Google Docs to trick you to freely give up your credentials.

hand connect binary access

Transforming secure access to take on today’s cyber threats

Last year, 81% of cyber attacks involved compromised passwords—up from 63% the previous year. How much worse can it get? Let’s not wait around to find out.

eliminate insider threats 1

Are you you?

Are insiders really threats or part of the solution?

Artificial intelligence and digital identity

What is identity management? IAM definition, uses, and solutions

Identity and access management products provide IT managers with tools and technologies for controlling user access to critical information within an organization.

security map digital encryption identity

What is Zero Trust? A model for more effective security

The technologies that support Zero Trust are moving into the mainstream. Here's why security experts say it might be the best way to stop data breaches.

Why data privacy should be respected throughout testing as well as production.

facial recognition - biometric security identification - binary face

Abuse: a new category of threat

There are many different ways for users to abuse accounts, the solutions to which rack up costs and create drag on internal resources. And some fixes may cause more problems than they solve.

package delivery

Who are you really inviting in?

The hackable doorknob next door…

facial recognition - biometric security identification

How the private sector can learn from government cybersecurity guidance

The National Institute of Standards and Technology (NIST) has been the voice of consensus and reference material in identity management cybersecurity best practices by outlining the requirements and providing insightful reference...

continuous authentication

Security myths: modern federation is enough

What exactly is federation and what does it have to do with single sign-on?

Load More