Identity Management Technology and Strategy
- March 02, 2016
Sophos' James Lyne warns that cybercriminals are becoming more effective, thanks to document-based malware and advanced social engineering techniques.
- February 18, 2015
The high percentage of password reuse and sharing by employees leaves enterprises vulnerable to breaches, according to a recent survey from SailPoint Technologies.
- December 14, 2012
Verizon and Criterion Systems will conduct a series of tests of a new validation process being designed for sensitive online transactions.
- July 20, 2011
President Obama's proposed Identity Ecosystem seeks to lock down personal credentials, but is it actually feasible?
- February 17, 2011
Verizon enhanced its enterprise identity management services with identity registration, credential provisioning and risk-based authentication.
- March 02, 2010
At the 2010 RSA Conference, Scott Charney, Microsoft's top Trustworthy Computing executive, discussed the software giant's new approach to botnet protection, detailed its new identity management technologies and explained why cloud computing risks ...