Identity Management

Identity Management news, analysis, how-to, opinion and video. | CIO

firewall hole
1 tracking hunting dogs horse

blockchain ecosystem

How the disruptive power of Blockchain could impact the digital economy

Blockchain holds plenty of promise for security and interoperability, but IT leaders are still trying to better understand the technology and how to put it to use. This much-hyped technology has an incredible power to disrupt many...

rsa 2017 v2 series branded lg

The state of privacy and security in an ever-evolving world

Privacy and security have evolved. We are seeing various breaches that are devastating organizations. How can you secure your data in a world full of mobile devices, IoT, and the cloud?

1 transform phone payment

10 ways Trusted Identities are used

It is always a struggle to control who gets into your network. A third-party might need access for the contractual work they are doing. HID Global runs through some ways trusted identities are used.

binoculars desert

Cybersecurity companies to watch

CBInsights created a list of startups that its metrics showed has early-to mid-stage high-momentum companies pioneering technology with the potential to transform cybersecurity. 

1 app hacked

How to prevent your mobile app from getting hacked

TriviaCrack may be addicting to users, but criminals are hooked on getting your personal information from other apps you use

03 cryptography

Swearing Trojan malware in China heralds things to come in the U.S.

A new piece of malware is running rampant in China, even though its crafters have already been arrested. It exploits new methods of distribution, but still relies on human weakness, which seems to be abundant. Phishing (general) and...

cloud security

Google tries to beat AWS at cloud security

New tools that protect enterprise applications running on Google Cloud Platform may help take the spotlight away from AWS and Microsoft Azure

false identity

Face-off: Oracle vs. CA for identity management

Considering identity and access management (IAM) software? Download this free report for side-by-side comparisons of rival products from Oracle and CA, based on reviews written by enterprise users of the products.

false identity

10 questions to ask IDaaS vendors before you buy

Of the Everests that IT faces daily, identity and access management is a particular challenge. These 10 questions help you find a solution that delivers what you need.

The DocuSign eSignature is becoming ubiquitous.

DocuSign continues to build out digital transaction management platform

DocuSign, a "unicorn" that helps companies achieve full digital transformation by eliminating paper from workflows, has come of age. With 100 million users now in 188 countries, a wide range of partners around the world, and...

01 empower

How identity management helps protect what ails patients

Eve Maler, vice president of innovation and emerging technology at ForgeRock, points out how Identity and Access Management is used to secure patient data.

diane greene oktane

Okta partners with Google to secure cloud identities

Okta and Google have announced a partnership aimed at getting enterprises to secure their users' identities in the cloud.

New features in Windows 10 laptop

Respect: Windows 10 security impresses hackers

Windows is a popular attack target for criminals and researchers alike, but Microsoft has done a good job of making it harder to target security flaws in the OS

mit anonymity Riffle privacy

Use Tor? Riffle promises to protect your privacy even better

Privacy-minded people have long relied on Tor for anonymity online, but a new system from MIT promises better protection and faster performance.

medical devices

Code red: Health IT must fix its security crisis

Poor understanding of risk leaves health providers vulnerable to attack, as malicious hackers threaten to wreak havoc

google io androids

Protecting yourself from Google’s protection racket

If identity validation involves complex AI computation, then no one except the behemoths will be able to do it anymore, which may be the idea.

6 social media

Think you don’t have a social media governance problem? Neither did this football player

A CIO should take a long, hard look at the highly publicized and bizarre social media blunder during the 2016 NFL Draft by Laremy Tunsil, offensive tackle for Ole Miss. A strategic CIO, mindful of social media governance and the...

slack icon

Slack is letting its users take their chat credentials to other apps

Slack is offering its users a new way to sign into other applications. The company announced Tuesday that it has launched a new "Sign in with Slack" feature that lets people use their login for the chat app to sign in to participating...

Load More