Privileged access management
- April 08, 2020
New research by Cisco Talos shows popular fingerprint scanning technology can be defeated by lifting actual fingerprints and reproducing them through 3D printers.
- July 19, 2019
CyberArk introduces CyberArk Alero to its privileged access management product lineup, in addition to other endpoint management and cloud offering updates.
- July 20, 2018
Experts at the Identiverse 2018 conference discussed how artificial intelligence and machine learning are poised to reshape the identity and access management market.
- June 23, 2017
News roundup: DOD inspector general found NSA failed to implement secure privileged user management post-Snowden. Plus, Honda hit by WannaCry, Trump met with tech CEOs and more.
- August 07, 2015
Machine learning is better at detecting malware than systems that scan for known signatures. But researchers at Black Hat 2015 say adding a twist widens the performance gap even further.
- January 08, 2015
Video: Lieberman Software CEO Philip Lieberman explains how privileged identity management can shore up the many weaknesses of password-based authentication.
- May 20, 2014
A new survey finds that, despite the huge looming threat of malicious insiders, many enterprises fail to implement proper privileged user controls.
- November 21, 2013
Edward Snowden's NSA leaks sparked much discussion on insider threats, but a recent study suggests privilege management policies remain unadjusted.
- October 25, 2013
The principle of least privilege is ingrained in IT security culture, but a survey shows many enterprises are not tightly managing user rights.
- March 25, 2013
This month, Information Security Magazine examines security industry changes that can really make a difference: improving identity management and building security into software from the get go.
- February 10, 2010
Expanding use of verification questions prompts concerns about privacy issues, but businesses say KBA has been vital in reducing fraud.
- October 20, 2008
Sun's Identity Compliance Manager gives enterprises a starting point for more complex ID management projects, says analyst.
- May 27, 2008
Trader Jerome Kerviel conducted more than $7 billion in fraudulent trades with the help of an assistant, according to an investigation conducted by banking giant Societe Generale
- April 08, 2008
M-Tech will become Hitachi ID Systems under the deal. The M-Tech acquisition is part of a broader trend of companies aggressively acquiring IAM technology.
- March 04, 2008
Sun Microsystems is making a move into the governance, risk and compliance market, ramping up the competition against Oracle, IBM, CA and others.
- December 12, 2007
Big Blue is melding automated features from its lightweight Express version in what it says should simplify deployments and ease end user pain.
- December 10, 2007
Companies that identify, monitor, report and investigate audit trails and conduct risk analytics are taking the right steps to protect critical data, according to one expert.
- November 13, 2007
To better serve customers preoccupied with regulatory compliance and identity management, Sun has agreed to acquire enterprise role-management vendor Vaau.
- September 13, 2007
IBM has been on a shopping spree over the last several years to beef up its Tivoli identity and access management suite. Over the summer, Big Blue rolled out the results of its acquisition with Consul Risk Management, launching the Tivoli Compliance...
- June 27, 2006
Security can be a hard sell beyond the IT realm, even for security pros at NASA. But nothing motivates people like regulatory pressure and a fear of being the next data breach headline.
- January 06, 2006
HOT PICK: Security is enhanced through ID-Synch's ability to enforce strong password policy across platforms. But that's not the only benefit.
- July 11, 2005
Last week IBM announced its new Data Governance Council, formalizing a group of enterprises and IT organizations that have been meeting quarterly for more than a year to discuss ways of better protecting data against online thieves. Council ...
- May 27, 2004
Los Angeles County Department of Health Services bioterrorism IT coordinator David Cardenas fields and distributes about a dozen serious health alerts to physicians, hospitals and response agencies and must ensure the flow of such sensitive ...
- June 16, 2003
A recent survey of data center professionals in various industries found that 52% of attacks come from individuals outside the enterprise.
- May 08, 2002
Identity management a must for the virtual enterprise
- October 29, 2001
Identity management good for bottom line