Identity and access management products
-
Opinion
06 Dec 2024
Six trends that will define cyber through to 2030
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
-
News
05 Dec 2024
Met Police challenged on claim LFR supported by ‘majority of Lewisham residents’
A community impact assessment for the Met Police’s deployment of live facial-recognition tech in Lewisham brings into question the force’s previous claims to Computer Weekly that its use of the technology is supported by ‘the majority of residents’ Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Tip
19 Dec 2011
Segregation of duties: Small business best practices
Segregating duties can be tough in organisations that have few staff members and resources. Get duty segregation best practices for SMBs. Continue Reading
By -
News
13 Dec 2011
Special report on EMC
This 8-page special report from Computer Weekly, packed with graphs and diagrams, is essential reading for anyone considering EMC as a supplier. Continue Reading
-
News
05 Dec 2011
Concerned about tablet security issues? Some are, others not so much
Users love their tablets, but security pros are concerned about tablet security issues. However, though tablets bring new threats, not everyone is ringing the alarm. Continue Reading
By -
News
05 Dec 2011
One in four IT security staff abuse admin rights, survey shows
At least one in four IT security staff use their privileged login rights to look at confidential information, a survey has revealed. Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
01 Dec 2011
Breaking the code: Are passwords destined for obscurity?
User passwords for websites, email and social networks are often the weakest link in the security chain. The winter edition of IT in Europe: Information Security e-zine investigated the state of passwords in the UK and presented alternatives to the ubiquitous authenticator. Continue Reading
-
News
17 Nov 2011
IT security not always part of cloud decision, says IDC
Cloud adoption is outstripping security concerns, says Eric Domage, programme manager for IDC in Europe. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
31 Oct 2011
Japan may be facing sustained cyber attack
Japan's mapping agency is the latest in a series of government agencies to be targeted by hackers, raising fears that the breaches are part of a series of sustained attacks. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
31 Oct 2011
Facebook admits to 600,000 cyber attacks a day
Facebook has revealed that every 24 hours it receives around 600,000 logins to the social networking website from impostors attempting to access users' messages, photos and other personal information. Continue Reading
By- Warwick Ashford, Senior analyst
-
Tip
27 Jul 2011
Website secure login: Alternatives to out-of-wallet questions
Learn about alternatives to static knowledge-based authentication and out-of-wallet questions for secure website logins in this tip. Continue Reading
By -
Tip
11 Apr 2011
Identity and access management (IAM) program implementation guidelines
The first part of this identity and access management (IAM) program guide details how to optimally structure the implementation’s foundation. Continue Reading
-
News
08 Apr 2011
After breach at RSA, two-factor authentication options abound
Companies specialising in two-factor authentication hope to boost business following the breach of RSA's SecurID, and many plan to capitalise with new products at Infosecurity Europe. Continue Reading
By -
News
22 Mar 2011
What is OpenID? How to use OpenID SSO in your organisation
An OpenID SSO system allows organisations to simplify website user authentication management. But is OpenID security an issue? Expert Michael Cobb explains. Continue Reading
By -
Tip
01 Mar 2011
10 identity and access management (IAM) implementation mistakes
An overview of the common issues organizations overlook while deploying an identity and access management (IAM) solution. Continue Reading
By- Nilesh Shirke
-
News
14 Jan 2011
Biometric authentication technology curbs microfinance org’s losses
Growing Opportunity implements biometric authentication technology to overcome financial losses resulting from duplicate loan applications. Continue Reading
By- Dhwani Pandya, Principal Correspondent
-
Feature
23 Aug 2007
Experts: IDS is here to stay
IDS technology has survived predictions that it would be replaced by IPS. One expert says it will remain a separate product while IPS is folded into firewalls. Continue Reading
By -
News
08 Mar 2007
Review: Sun Java System Identity Manager 7.0 'impressive'
Hot Pick: Sun Java System Identity Manager 7.0 excels with agentless connectors, scalability and amazing auditing. Continue Reading
By -
Feature
26 Feb 2007
RFID privacy, security should start with design
Companies planning to deploy radio frequency identification technology (RFID) must demand that privacy and security issues are addressed early. Continue Reading
By- Robert Westervelt, TechTarget
-
News
19 Feb 2007
Sourcefire fixes Snort flaw
Attackers could exploit a flaw in the popular open source Snort IDS tool to cause a denial of service or launch malicious code. Continue Reading
By -
Feature
30 Jan 2007
Quiz: Using IAM tools to improve compliance
A five-question multiple-choice quiz to test your understanding of the content presented by expert Tom Bowers in this lesson of SearchSecurity.com's Identity and Access Management Security School. Continue Reading
-
News
30 Jan 2007
Symantec unveils 'universal ID system'
Symantec said the goal is to create a universally accepted identity system across all Web sites -- from online financial institutions to retailers -- for millions of consumers. Continue Reading
By- SearchSecurity.com Staff
-
News
23 Jan 2007
McAfee: Malware all about ID theft
The use of keylogger technology is surging and there's been a 100-fold rise in phishing attacks, according to a new report from McAfee. Continue Reading
By- Bill Brenner, Senior News Writer
-
News
18 Jan 2007
ID theft victim to TJX customers: Mind your data
Customers should guard their own data, says one ID theft victim. Meanwhile, some in the banking industry say TJX may have stored more data than necessary. Continue Reading
By -
Feature
13 Dec 2006
Review: Lancope StealthWatch 5.5 offers more than IDS
Hot Pick: StealthWatch goes far beyond traditional intrusion detection, with powerful network-monitoring features. The optional IDentity-1000 is an essential addition. Continue Reading
By- Sandra Kay Miller, Contributing Writer
-
Feature
31 Aug 2006
Identity and Access Management Security School
This Security School explores critical topics related to helping security practitioners establish and maintain an effective identity and access management plan. Continue Reading
-
News
06 Jul 2006
Strong authentication for businesses large and small
Product review: Customer service could return calls more quickly when there's a problem. But overall, RSA SecurID Appliance 2.0 delivers robust, scalable protection. Continue Reading
By- Phoram Mehta, Contributing Writer
-
Feature
19 Jun 2005
How to survive a data breach
When Colin Crook offers advice on how companies should deal a security breach, he speaks from experience. He was CTO of Citicorp [now Citigroup, parent company of Citibank] 10 years ago when a hacker penetrated the company's network.
Crook is now senior advisor to the Wharton Fellows at the University of Pennsylvania, a member of the New York Academy of Sciences; fellow of the Royal Academy of Engineering and co-author of "The Power of Impossible Thinking." He shared his experiences with customers of Framingham, Mass.-based ID management firm Courion Corp. during the company's Converge05 conference last week. Business executives, he argues, must do better at listening to others and understand security is about humans, not machinery.
In the first of a two-part question-and-answer feature, Crook explains how companies can survive the fallout from a data heist.
Continue ReadingBy -
News
14 Apr 2005
Who should be on (and off) the hook for ID theft?
An influential cryptographer and a panel of technologists today debate how best to fight false authentication and fraudulent transactions. Continue Reading
By- Anne Saita, TechTarget
-
News
03 Apr 2005
Are identities safer on laptops than central databases?
Microsoft pledges better ID security. Given the theft of a laptop storing 100,000 Social Security numbers, Redmond's approach could prove controversial. Continue Reading
By- SearchSecurity.com Staff
-
News
15 Mar 2005
ID theft and national security
Check out what some ITKnowledge Exchange members had to say about this controversial issue. Continue Reading
-
News
31 Jan 2005
ID theft remains No. 1 worry
For the fifth straight year, the FTC said most complaints came from identity theft victims. And that's a problem for enterprises. Continue Reading
By