Identity management & protection News
March 19, 2015
As AWS expands into apps such as email, experts say it should strengthen its data privacy credentials by following the controls set forth in the new ISO 27018 standard.
January 21, 2015
The Online Trust Alliance finds that over 90% of data breaches resulting in data loss could have been prevented.
October 31, 2014
A new study by cloud security startup Elastica shows that enterprise employees are unknowingly leaking sensitive data through cloud apps and services.
September 29, 2014
A recent study from the Cloud Security Alliance shows strong support for global data privacy standards as well as a consumer bill of rights, but there are major obstacles for privacy in the cloud.
Identity management & protection Get Started
Bring yourself up to speed with our introductory content
First we had data. Then we had big data. Now we have data lakes. Will the murky depths prove bountiful? Continue Reading
Organizations are often looking to minimize costs without compromising on security. Expert Randall Gamby examines the benefits of open source identity management software. Continue Reading
Take this quiz to test your knowledge of abbreviations related to the Payment Card Industry Data Security Standard (PCI DSS). Continue Reading
Evaluate Identity management & protection Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Outbreaks of Ebola caused widespread fear, but should enterprises be worried about the effect on HIPAA compliance requirements? Compliance expert Mike Chapple explains. Continue Reading
Service providers must up their game to protect their SMB customers from evolving security threats. Stanley Louissant offers best practices for ensuring your clients and their data remain secure. Continue Reading
Users working on multiple devices want access to customized app environments. Cognito creates a back end for identity management and gives those users a consistent experience. Continue Reading
Manage Identity management & protection
Learn to apply best practices and optimize your operations.
EMM may be the key to balancing personal privacy and business control. Discover important elements of a BYOD policy and new ways to control apps. Continue Reading
Encrypting data is a good first step, but if you don't properly authenticate users, sensitive information can still fall into the wrong hands. Continue Reading
The cloud threat-modeling process begins with a fundamental understanding of threat management. Expert Ravila Helen White details these best practices for enterprises. Continue Reading
Problem Solve Identity management & protection Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Radiant Logic's Dieter Schuller says companies trying to master attribute-based access control should start with a hybrid mode. Continue Reading
Educational Testing Services uses Oracle Identity Management to manage access and keep SAT, GRE and Advanced Placement test data safe. PricewaterhouseCoopers recommends Oracle Identity Manager to its big banking clients with complex needs. Continue Reading
Is it smart for infosec teams to push for integration of logical and physical access control systems? Learn how to make the case and where to start. Continue Reading