Identity Management

Identity Management | News, how-tos, features, reviews, and videos

bio metrics security identity privacy circuitry circuit board locks breach cybersecurity
binary / mask / artificial intelligence / conceal / hide / identity / anonymous

flextronics

Flex strengthens supply chain with IAM

An identity and access management solution helps the technology company provision and deprovision identities for thousands of employees and supply chain partners, allowing CIO Gus Shahin to move on to more strategic efforts, including...

facial recognition - biometric security identification - binary face

From federated identity to consolidated identity: a look at the past, present and future

It’s time for a better way to maintain identity in the enterprise. Let’s explore a new identity model, Consolidated Identity, that will simplify how employees authenticate into systems, access data and complete workflows.

facial recognition - biometric security identification - binary face

The economics of digital identities

By creating models that disintermediate and give users more control, blockchain-based self-sovereign IDs and associated data marketplaces redefine the balance of power encompassing digital identities.

cloud architecture skyscrapers

Architecture firm transforms client experience with secure cloud collaboration

Perkins+Will CIO Murali Selvaraj has tapped cloud collaboration and identity management services to help architects and clients better share information on high-stakes projects.

Google self driving car

How blockchain is hastening the advance of autonomous cars

Blockchain is quickly achieving parity between human and robotic drivers, and should soon accelerate self-driving solutions into the realm of statistical perfection.

SAP sign

SAP buys Gigya to boost customer identity access management offering

SAP is giving its business software users a new way to track their customers, with the acquisition of customer identity management specialist Gigya.

1 tracking hunting dogs horse

Pitfalls of identity access management

Whether dealing with a third parties access or tracking an insider through your network, action needs to be take to see who goes where. Too few organizations treat IAM as the crucial, secure connective tissue between businesses'...

firewall hole

Third parties leave your network open to attacks

With the Target example as the high-water mark, enterprises need to worry about the lack of security on a third parties’ part. How do you tighten things up?

blockchain ecosystem

How the disruptive power of Blockchain could impact the digital economy

Blockchain holds plenty of promise for security and interoperability, but IT leaders are still trying to better understand the technology and how to put it to use. This much-hyped technology has an incredible power to disrupt many...

rsa 2017 v2 series branded lg

The state of privacy and security in an ever-evolving world

Privacy and security have evolved. We are seeing various breaches that are devastating organizations. How can you secure your data in a world full of mobile devices, IoT, and the cloud?

1 transform phone payment

10 ways Trusted Identities are used

It is always a struggle to control who gets into your network. A third-party might need access for the contractual work they are doing. HID Global runs through some ways trusted identities are used.

binoculars desert

Cybersecurity companies to watch

CBInsights created a list of startups that its metrics showed has early-to mid-stage high-momentum companies pioneering technology with the potential to transform cybersecurity. 

How to prevent your mobile app from getting hacked

TriviaCrack may be addicting to users, but criminals are hooked on getting your personal information from other apps you use

03 cryptography

Swearing Trojan malware in China heralds things to come in the U.S.

A new piece of malware is running rampant in China, even though its crafters have already been arrested. It exploits new methods of distribution, but still relies on human weakness, which seems to be abundant. Phishing (general) and...

Load More
You Might Also Like