access control

  • Startup spins up identity and access-control cloud service

    Posted February 20, 2013 - 11:41 am

    Startup Stormpath makes its debut today with an identity and access-control cloud-based service primarily intended for use by software development teams that are building web applications.
  • Online dating sites: Looking for love, finding violations of privacy

    Posted February 10, 2012 - 5:47 pm

    If any category of social networking site should have decent privacy it would be online dating sites. Who wants the world to know the details of what we look for in a mate (though Julian Assange's leaked out). Unfortunately, privacy isn't on the agenda at most dating sites.
  • How the Red Cross found its ID management groove

    Posted January 18, 2012 - 2:57 pm

    Red Cross CISO Suzanne Hall on the organization's monster effort to overhaul security and identity management.
  • Network architecture rule No. 1: Segregate everything

    Posted January 5, 2012 - 1:42 pm

    In the face of breakneck growth, you absolutely must maintain appropriate segregation of enterprise data networks, storage networks, and more.
  • SailPoint takes identity management to the cloud

    Posted March 29, 2011 - 8:33 am

    SailPoint Tuesday put forward its strategy to extend the provisioning and access control capabilities of its IdentityIQ product to cloud-based environments.
  • Too much access? Privileged Identity Management can help

    Posted November 18, 2010 - 11:01 pm

    Privileged identity management (PIM) products automate control over administrative accounts, which typically put too much power in too many people's hands with too little accountability. They address the security, operational and compliance issues posed by the widely shared administrative accounts and passwords, excessive administrative rights, poor separation of duties, embedded passwords in legacy applications and scripts, and poor or nonexistent privileged-password rotation. They also provide individual accountability and an audit trail to prove that policies and controls are actually being enforced.
  • Privileged Identity Management: 7 tips to make it work

    Posted November 18, 2010 - 6:16 pm

    PIM tools help get a handle on sprawling accounts and disjointed management of privileged access. If you do it right. Here are seven key strategies.
  • Are passwords a waste of time?

    Posted May 3, 2010 - 8:56 pm

    I apologize up front for jumping into this debate, but I couldn't resist. Not a week goes by, or so it seems, without some newspaper, magazine or TV show (apologies to my media brethren) lambasting security and IT professionals because they force unnecessary security controls on the poor, downtrodden consumer or worker. It's as if your security requirements are designed to make everyone's life miserable with little or no benefit. You evil CSOs! My heart bleeds for the poor peasants whom you oppress.
  • Cloud computing makes IT access governance messier

    Posted April 20, 2010 - 11:13 am

    IT professionals are finding it harder than ever to set up access controls for network resources and applications used by organization employees, and cloud computing is only adding to their woes, a survey of 728 IT practitioners finds.
  • SafeNet looks to secure data in the cloud

    Posted March 3, 2010 - 4:48 pm

    Encryption vendor SafeNet is now offering technologies that help enterprises securely store and access information held in third-party data centers.
  • Study: Secret questions don't safeguard passwords

    Posted May 19, 2009 - 1:20 pm

    Free e-mail providers often present a so-called "secret question" as a verification mechanism to reset an account password. But the answer is often easily guessable by other people who know the account holder, according to a new study to be released during the IEEE Symposium on Security and Privacy.
  • How SCAP Brought Sanity to Vulnerability Management

    Posted May 18, 2009 - 10:32 am

    With the proliferation of vulnerability assessment products and services, we have begun to create a different problem. Any organization that maintains a reasonably sized infrastructure or Web presence can easily end up with many different applications, services and tools to maintain and monitor their vulnerabilities.
  • Sun ties identity app to Google, Amazon cloud platforms

    Posted April 23, 2009 - 4:42 pm

    Sun Wednesday tied its identity federation software to Google Apps and added its directory and Web application server to the cloud platform t is building for developers to build and test applications.

Join today!

See more content
Ask a Question