Identity Management

Identity Management news, solutions, and analysis for IT professionals

continuous authentication
security map digital encryption identity

human weak link cybersecurity primary

What is a supply chain attack? Why you should be wary of third-party providers

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

6 password

Ready for more secure authentication? Try these password alternatives and enhancements

Password-only authentication is dead. Combine passwords with multifactor authentication, social login, biometrics, or risk-based authentication to better protect users and your reputation.

facebook workplace chat

Facebook tests stand-alone Workplace Chat app

The social network has quietly published a standalone Workplace Chat app to complement its existing browser-based Workplace enterprise networking service.

hand holding paper cloud for SAP logo

SAP buys Gigya to boost customer identity access management offering

SAP is giving its business software users a new way to track their customers, with the acquisition of customer identity management specialist Gigya.

solar eclipse

When identity data eclipses digital identity

Digital identity needs to be redefined as verified identity data. Identity data, using the right tools, can be used to carry out online jobs on behalf of the real me. But the right technology, aka personal data stores, need to be in...

04 insider threat

How to spot and prevent insider threats

Are departing employees taking data with them? Here’s what you need to know about detecting insider threats and better protecting your enterprise network and proprietary information.

biometrics

The best identity management advice right now

We've never been closer to getting pervasive, global identities. And with 2FA/MFA, you get all of the benefit with less of the risk.

1 tracking hunting dogs horse

Pitfalls of identity access management

Whether dealing with a third parties access or tracking an insider through your network, action needs to be taken to see who goes where. Too few organizations treat IAM as the crucial, secure connective tissue between businesses'...

1 transform phone payment

10 ways Trusted Identities are used

It is always a struggle to control who gets into your network. A third-party might need access for the contractual work they are doing. HID Global runs through some ways trusted identities are used.

How to prevent your mobile app from getting hacked

TriviaCrack may be addicting to users, but criminals are hooked on getting your personal information from other apps you use

cloud security

Google tries to beat AWS at cloud security

New tools that protect enterprise applications running on Google Cloud Platform may help take the spotlight away from AWS and Microsoft Azure

diane greene oktane

Okta partners with Google to secure cloud identities

Okta and Google have announced a partnership aimed at getting enterprises to secure their users' identities in the cloud.

New features in Windows 10 laptop

Respect: Windows 10 security impresses hackers

Windows is a popular attack target for criminals and researchers alike, but Microsoft has done a good job of making it harder to target security flaws in the OS

mit anonymity Riffle privacy

Use Tor? Riffle promises to protect your privacy even better

Privacy-minded people have long relied on Tor for anonymity online, but a new system from MIT promises better protection and faster performance.

medical devices

Code red: Health IT must fix its security crisis

Poor understanding of risk leaves health providers vulnerable to attack, as malicious hackers threaten to wreak havoc

slack icon

Slack is letting its users take their chat credentials to other apps

Slack is offering its users a new way to sign into other applications. The company announced Tuesday that it has launched a new "Sign in with Slack" feature that lets people use their login for the chat app to sign in to participating...

microsoft stock campus building

Microsoft offers blockchain love with new partnership

Microsoft has teamed up with a consortium of banks to help develop new methods for using blockchain -- the technology that underpins Bitcoin -- to support financial transactions.

Load More