Identity and access management products
-
News
28 May 2025
Remote purchase fraud surges 14%, says banking industry
Brits lost over £1bn to payment fraud in its many forms last year, according to the latest banking industry numbers Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
27 May 2025
Maturing UK fintechs increase tech and cyber security hiring
Increased hiring reflects that fintechs are maturing and now require more cyber security and compliance experts Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
31 Oct 2011
Japan may be facing sustained cyber attack
Japan's mapping agency is the latest in a series of government agencies to be targeted by hackers, raising fears that the breaches are part of a series of sustained attacks. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
31 Oct 2011
Facebook admits to 600,000 cyber attacks a day
Facebook has revealed that every 24 hours it receives around 600,000 logins to the social networking website from impostors attempting to access users' messages, photos and other personal information. Continue Reading
By- Warwick Ashford, Senior analyst
-
Tip
27 Jul 2011
Website secure login: Alternatives to out-of-wallet questions
Learn about alternatives to static knowledge-based authentication and out-of-wallet questions for secure website logins in this tip. Continue Reading
By -
Tip
11 Apr 2011
Identity and access management (IAM) program implementation guidelines
The first part of this identity and access management (IAM) program guide details how to optimally structure the implementation’s foundation. Continue Reading
-
News
08 Apr 2011
After breach at RSA, two-factor authentication options abound
Companies specialising in two-factor authentication hope to boost business following the breach of RSA's SecurID, and many plan to capitalise with new products at Infosecurity Europe. Continue Reading
By -
News
22 Mar 2011
What is OpenID? How to use OpenID SSO in your organisation
An OpenID SSO system allows organisations to simplify website user authentication management. But is OpenID security an issue? Expert Michael Cobb explains. Continue Reading
By -
Tip
01 Mar 2011
10 identity and access management (IAM) implementation mistakes
An overview of the common issues organizations overlook while deploying an identity and access management (IAM) solution. Continue Reading
By- Nilesh Shirke
-
News
14 Jan 2011
Biometric authentication technology curbs microfinance org’s losses
Growing Opportunity implements biometric authentication technology to overcome financial losses resulting from duplicate loan applications. Continue Reading
By- Dhwani Pandya, Principal Correspondent
-
Feature
23 Aug 2007
Experts: IDS is here to stay
IDS technology has survived predictions that it would be replaced by IPS. One expert says it will remain a separate product while IPS is folded into firewalls. Continue Reading
By -
News
08 Mar 2007
Review: Sun Java System Identity Manager 7.0 'impressive'
Hot Pick: Sun Java System Identity Manager 7.0 excels with agentless connectors, scalability and amazing auditing. Continue Reading
By -
Feature
26 Feb 2007
RFID privacy, security should start with design
Companies planning to deploy radio frequency identification technology (RFID) must demand that privacy and security issues are addressed early. Continue Reading
By- Robert Westervelt, TechTarget
-
News
19 Feb 2007
Sourcefire fixes Snort flaw
Attackers could exploit a flaw in the popular open source Snort IDS tool to cause a denial of service or launch malicious code. Continue Reading
By -
Feature
30 Jan 2007
Quiz: Using IAM tools to improve compliance
A five-question multiple-choice quiz to test your understanding of the content presented by expert Tom Bowers in this lesson of SearchSecurity.com's Identity and Access Management Security School. Continue Reading
-
News
30 Jan 2007
Symantec unveils 'universal ID system'
Symantec said the goal is to create a universally accepted identity system across all Web sites -- from online financial institutions to retailers -- for millions of consumers. Continue Reading
By- SearchSecurity.com Staff
-
News
23 Jan 2007
McAfee: Malware all about ID theft
The use of keylogger technology is surging and there's been a 100-fold rise in phishing attacks, according to a new report from McAfee. Continue Reading
By- Bill Brenner, Senior News Writer
-
News
18 Jan 2007
ID theft victim to TJX customers: Mind your data
Customers should guard their own data, says one ID theft victim. Meanwhile, some in the banking industry say TJX may have stored more data than necessary. Continue Reading
By -
Feature
13 Dec 2006
Review: Lancope StealthWatch 5.5 offers more than IDS
Hot Pick: StealthWatch goes far beyond traditional intrusion detection, with powerful network-monitoring features. The optional IDentity-1000 is an essential addition. Continue Reading
By- Sandra Kay Miller, Contributing Writer
-
Feature
31 Aug 2006
Identity and Access Management Security School
This Security School explores critical topics related to helping security practitioners establish and maintain an effective identity and access management plan. Continue Reading
-
News
06 Jul 2006
Strong authentication for businesses large and small
Product review: Customer service could return calls more quickly when there's a problem. But overall, RSA SecurID Appliance 2.0 delivers robust, scalable protection. Continue Reading
By- Phoram Mehta, Contributing Writer
-
Feature
19 Jun 2005
How to survive a data breach
When Colin Crook offers advice on how companies should deal a security breach, he speaks from experience. He was CTO of Citicorp [now Citigroup, parent company of Citibank] 10 years ago when a hacker penetrated the company's network.
Crook is now senior advisor to the Wharton Fellows at the University of Pennsylvania, a member of the New York Academy of Sciences; fellow of the Royal Academy of Engineering and co-author of "The Power of Impossible Thinking." He shared his experiences with customers of Framingham, Mass.-based ID management firm Courion Corp. during the company's Converge05 conference last week. Business executives, he argues, must do better at listening to others and understand security is about humans, not machinery.
In the first of a two-part question-and-answer feature, Crook explains how companies can survive the fallout from a data heist.
Continue ReadingBy -
News
14 Apr 2005
Who should be on (and off) the hook for ID theft?
An influential cryptographer and a panel of technologists today debate how best to fight false authentication and fraudulent transactions. Continue Reading
By- Anne Saita, TechTarget
-
News
03 Apr 2005
Are identities safer on laptops than central databases?
Microsoft pledges better ID security. Given the theft of a laptop storing 100,000 Social Security numbers, Redmond's approach could prove controversial. Continue Reading
By- SearchSecurity.com Staff
-
News
15 Mar 2005
ID theft and national security
Check out what some ITKnowledge Exchange members had to say about this controversial issue. Continue Reading
-
News
31 Jan 2005
ID theft remains No. 1 worry
For the fifth straight year, the FTC said most complaints came from identity theft victims. And that's a problem for enterprises. Continue Reading
By