Identity Management
Identity Management | News, how-tos, features, reviews, and videos
Code red: Health IT must fix its security crisis
Poor understanding of risk leaves health providers vulnerable to attack, as malicious hackers threaten to wreak havoc
Protecting yourself from Google’s protection racket
If identity validation involves complex AI computation, then no one except the behemoths will be able to do it anymore, which may be the idea.
Think you don’t have a social media governance problem? Neither did this football player
A CIO should take a long, hard look at the highly publicized and bizarre social media blunder during the 2016 NFL Draft by Laremy Tunsil, offensive tackle for Ole Miss. A strategic CIO, mindful of social media governance and the...
Slack is letting its users take their chat credentials to other apps
Slack is offering its users a new way to sign into other applications. The company announced Tuesday that it has launched a new "Sign in with Slack" feature that lets people use their login for the chat app to sign in to participating...
Blockchain technology: hype or reality?
In this blog, I discuss blockchain technology, the comparison to bitcoin, the movement to decentralized computing, and what that looks like in terms of a reference stack, and some of the advantages and disadvantages of blockchain, and...
Microsoft offers blockchain love with new partnership
Microsoft has teamed up with a consortium of banks to help develop new methods for using blockchain -- the technology that underpins Bitcoin -- to support financial transactions.
DAASI, Collabora team to bring identity management to CloudSuite, LibreOffice Online
The partnership will also bring LibreOffice Online into the European Commission funded AARC project.
Apple vs. FBI case colors European debate about securing digital identity
Although Apple does not exhibit at Mobile World Congress, the iPhone maker influences exhibiting app developers and accessory vendors and, now, debate at the show about securing digital identity.
IBM goes all in on blockchain, offers cloud-based service
IBM offers a cloud-based service to help businesses set up blockchain networks and test and deploy apps.
Nasdaq to use blockchain to record shareholder votes
Later this year, Nasdaq plans to record stockholders' electronic votes on its own blockchain system for companies listed on its exchange in Estonia. By digitizing the entire process, it expects to speed and simplify the proxy voting...
Identity theft victim? This site helps you reclaim your life
A revamped government website will offer consumers personalized, step-by-step guidance to reclaim their identities and untangle compromised accounts.
A tale of two women: Same birthday, same Social Security number, same big-data mess
Two Florida women were born on the same day in the same state and given almost the same name. Though no one realized it at the time, it turns out they were also given the same Social Security number.
LogMeIn buying password manager LastPass
LogMeIn hopes to bring even more consolidation to the single-sign-on market with the acquisition of password management service LastPass.
IRS: Tax breach much worse than originally thought
The cyberattack on U.S. taxpayer data reported by the Internal Revenue Service earlier this year now appears to be much worse than originally thought, the agency announced Monday, with as many as 300,000 citizens now believed to be...
Dropbox adds U2F support for better security
It's a better option for high-security environments, one analyst says
File sync services provide covert way to control hacked computers
Researchers highlight the potential use of file synchronization services for stealthy and persistent remote control
IBM fixes serious flaw in Endpoint Manager for mobile device management
The flaw can be exploited to execute arbitrary code on the management server
PoS malware also targeting ticket vending machines and electronic kiosks
Researchers found a new malware program that can steal information from a large number of point-of-sale systems
Citadel malware now targets password management applications
A new Citadel configuration steals the master keys for two password managers and a secure authentication program
USB Armory is the Swiss army knife of security devices
A USB-stick computer built around a processor with strong security capabilities
-
Video/Webcast
Sponsored -
Analyst Report
Sponsored -
White Paper
-
Data Sheet
Sponsored -
eBook
Sponsored