Please turn on your JavaScript for this page to function normally.
user
Do third-party users follow security best practices and policies?

Many organizations across the globe fall short of effectively managing access for third-party users, exposing them to significant vulnerabilities, breaches and other security …

binary
Researcher releases PoC code for critical Atlassian Crowd RCE flaw

A researcher has released proof-of-concept code for a critical code execution vulnerability (CVE-2019-11580) in Atlassian Crowd, a centralized identity management solution …

identity
Why identity is the foundation of security

Once upon a time, companies secured their valuable information by locking file cabinets and installing passwords and firewalls around databases and systems in office-based …

keys
Businesses are struggling to implement adequate IAM and PAM processes, practices and technologies

Businesses find identity and access management (IAM) and privileged access management (PAM) security disciplines difficult yet un-concerning. The results infer that IAM- and …

risk
Five ways automating IAM saves you money

Identity is the foundation of security, so a robust automated identity and access management (IAM) system is by far the best way to keep your company’s information safe. It’s …

degree
74% of organizations face outages due to expired certificates

As information security budgets grow and funds are allocated to protect the defensive perimeter, many companies have overlooked the critical importance of digital certificate …

blocks
The building blocks of blockchain-based digital identity

In earlier articles, I discussed what a shared digital identity can do as well as which organizations are the right starting point to adopt a solution for digital identity …

building
Building shared digital identity using blockchain technology

I previously described challenges both consumers and organizations face when it comes to user identity and how a shared digital identity can reshape digital trust as we know …

tunnel
Safeguarding hybrid-cloud infrastructures through identity privilege management

Most enterprises have embraced the advantages a cloud infrastructure can bring to their computing, storage, network or other needs, and many are juggling multiple cloud …

identity
You are who you say you are: Establishing digital trust with the blockchain

Over the last few years, blockchain use has gained popularity driven partly by the interest in cryptocurrency, but mostly with the growing understanding of what distributed …

colors
Why identity verification needs to be a part of your digital transformation strategy

Smartphones and tablets are an indispensable part of daily life, and consumers expect nothing less than a streamlined mobile experience. With this in mind, businesses are …

face
Identity verification: Staying ahead of post-breach era consumer preferences

In the wake of numerous high-profile data breaches and privacy incidents, consumers are increasingly concerned about the security of their identities and what companies are …

Don't miss

Cybersecurity news