By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Identity Management Technology and Strategy News
June 24, 2016
At the 2016 Cloud Identity Summit, security experts discussed how fears of nation-state attackers and APT groups are spurring a renewed focus on identity and access management.
March 02, 2016
Sophos' James Lyne warns that cybercriminals are becoming more effective, thanks to document-based malware and advanced social engineering techniques.
February 18, 2015
The high percentage of password reuse and sharing by employees leaves enterprises vulnerable to breaches, according to a recent survey from SailPoint Technologies.
December 14, 2012
Verizon and Criterion Systems will conduct a series of tests of a new validation process being designed for sensitive online transactions.
Identity Management Technology and Strategy Get Started
Bring yourself up to speed with our introductory content
Identity and access management, or IAM, has long been a crucial consideration in the formulation of corporate security strategy. IAM policy today must contend with a variety of major changes sweeping the world of IT. One of the latest is the spread ... Continue Reading
Securing enterprise systems and information requires an IAM roadmap that helps you identify effective policy, technology and tools. Continue Reading
An identity and access management system is increasingly essential to corporate security, but technological advances have made managing an IAM more complex than ever. Continue Reading
Evaluate Identity Management Technology and Strategy Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Identity management is a core component of cybersecurity readiness, but there are many layers and complexities behind it. Expert Peter Sullivan explains the basics of IAM. Continue Reading
With more employees bringing their own devices and network-connected objects -- such as keycard controls and energy monitoring systems -- the digital footprint of the internet of things is only increasing. Yet the security industry is starting to ... Continue Reading
Microsoft's Windows 10 Wi-Fi Sense was designed to make hotspot sharing easy, but experts debate if the security risks are real and whether the new feature offers substantial benefits and relative safety. Continue Reading
Manage Identity Management Technology and Strategy
Learn to apply best practices and optimize your operations.
More likely than not, your company's identity and access management strategy needs an update. Learn how to decide if that's the case and, if so, what you should do now. Continue Reading
Companies in certain industries -- manufacturing, healthcare and critical infrastructure -- are already dealing with securing the internet of things; others will have to start. Continue Reading
Most of the pivotal changes in identity and access management, or IAM, were discussed and developed at least ten years ago. Deployment of advanced IAM security technology has been glacial in comparison to most other security technologies because of ... Continue Reading
Problem Solve Identity Management Technology and Strategy Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Attackers use compromised credentials to infiltrate enterprises undetected and steal corporate data. Expert Nick Lewis offers the best ways to handle this threat. Continue Reading
An authentication framework based on a decentralized operational model is commonplace in the financial-services market, but complicates compliance. In this tip, Randall Gamby explains how financial companies can migrate to a centralized ... Continue Reading