Get started
Bring yourself up to speed with our introductory content.
Privileged access management
federated identity management (FIM)
Federated identity management (FIM) is an arrangement that can be made among multiple enterprises to let subscribers use the same identification data to obtain access to the networks of all enterprises in the group. Continue Reading
CISSP Domain 5: Cloud identity management and access control
From cloud identity and access management to physical access control, this study guide will help you review key concepts from Domain 5 of the CISSP exam. Continue Reading
principle of least privilege (POLP)
The principle of least privilege (POLP), an important concept in computer security, is the practice of limiting access rights for users to the bare minimum permissions they need to perform their work. Continue Reading
-
identity and access management (IAM)
Identity and access management (IAM) is a framework for business processes that facilitates the management of electronic or digital identities. Continue Reading
Biometrics and beyond: Online authentication techniques get personal
Biometrics and behavioral analysis is taking hold as security pros search for authentication tools to thwart increasingly aggressive and innovative hacking attacks. Continue Reading
Managing access to keep privileged users' credentials secure
Privilege creep is a constant threat. It's why privileged user management must be part of any comprehensive security plan and always at the top of an infosec pro's to-do list.Continue Reading
Test your privileged user management knowledge
Test your proficiency in privileged user management. Take this quiz to determine your ability to keep privileged access secure across your organization.Continue Reading
IAM strategy: Update to work with new technologies
Your organization needs to make decisions about its IAM strategy in order to keep up with the new technologies its deploying. Steps to take begin at the policy level.Continue Reading
How IAM can address unstructured content security risks
The amount of enterprise unstructured content is growing every year. Expert Sean Martin explains why IAM is an important component of unstructured data management and security.Continue Reading
bimodal IAM (bimodal identity access management)
Bimodal identity and access management (IAM) uses two forms of credentials, internal and external, as a method of authentication.Continue Reading
-
Which is safer: an HSM appliance or a virtual appliance?
A self-managed HSM appliance may be the safer external key management system to use with your organization's encryption keys. Here's why.Continue Reading
identity governance
Identity governance is the policy-based centralized orchestration of user identity management and access control.Continue Reading
access control
Access control is a security technique that can be used to regulate who or what can view or use resources in a computing environment.Continue Reading
A broader definition of identity governance
The definition of identity governance has evolved to include a tool that could prove challenging for enterprises to implement.Continue Reading
Exploring logical, physical access control systems integration
Is it smart for infosec teams to push for integration of logical and physical access control systems? Learn how to make the case and where to start.Continue Reading