Identity Management News, Features, and Interviews


Peoplebank processing contractors faster with cloud-based PKI

By David Braue | 02 April, 2014 17:22

Specialist recruitment giant Peoplebank is seeing significant time savings after implementing a digital signature system that has significantly improved its everyday work processes.

Wearable Tech - Can your life be hacked?

By Anthony Caruana | 07 March, 2014 10:30

Paraphrasing the song made famous in the 1960s by The Troggs and wonderfully updated by Bill Nighy in "Love Actually" Big Data is really all around us. We are making more and more data about ourselves available to a broader audience. But what if that data is stolen? Is it useful to anyone?

AADHAAR: How do you build the world's largest identity system?

By Anthony Caruana | 10 October, 2013 13:34

Here’s a challenge. Take a nation with a population in excess of 1.2 billion people and create a database that gives each and every person a unique 12-digit identifier and stores their fingerprints, a photograph and their iris. The purpose is to provide secure authentication and access to services.

Clearswift acquires Jedda Systems

By Hamish Barwick | 10 September, 2013 10:56

Security firm Clearswift has acquired endpoint solutions developer Jedda Systems for an undisclosed sum.

Centrify-Paradyne partnership reflects growing demand for cloud-apps single sign-on

By David Braue | 03 September, 2013 14:32

Cloud-computing consultancy Paradyne will offer its customers cloud identity and access management (IAM) tools from Centrify, giving that company’s cloud-based single sign-on (SSO) technology a big leg up in a local market where cloud-based services are rapidly gaining enterprise legitimacy.


Destroying data to protect against fraud

By Neerav Bhatt | 18 October, 2011 07:39

Destroying data to protect against fraud.


It Wasn’t Me, It Was Bennett Arron

By Bennett Arron | 11 July, 2011 18:31

So, Identity Theft. What is it really? Well, I’m glad you asked. It’s basically when your personal details are used fraudulently to open accounts or obtain documentation in your name. This could result in debts being accumulated, for which you would initially be accountable – until you prove yourself innocent.

Novell, CA push to secure identity, security in cloud

By Kevin Fogarty | 07 August, 2009 05:26

Two major identity management companies are forging ahead with products designed to satisfy what a cloud-computing consortium calls one of the trickiest problems preventing secure and automated connections between internal IT infrastructures and external service providers: identity and authentication.

AFP hits $6 million identity fraud syndicate

By CIO Staff | 03 July, 2009 08:25

The Australian Federal Police (AFP) claims to have struck a major blow to a multi-million identity fraud syndicate.

Free Tools to Send Anonymous Messages

By Brandon Gregg | 18 June, 2009 02:07 | 6 Comments

Whether it is for an investigation, a whistle-blower statement, a prank or just extreme paranoia, you may have a need for anonymously sending messages. The following five tools provide an easy to use way to communicate incognito with Internet surfing, emails, phone calls and text messages. While these tools have their limitations, they do provide an Investigator a great way to hide his identity, gather intelligence, and communicate secretly when needed.

Social Engineering: The Fine Art of BS, Face to Face

By Joan Goodchild | 08 June, 2009 23:06

Chris Nickerson is willing to push it about as far as a person can go when it comes to security assessments. The founder of Lares, a security consultancy in Colorado, Nickerson conducts what he calls "Red Team Assessments" for clients. He is paid to try and dupe a client, and the client's employees, to give them a clear picture of the weak spots in their security plan. He then advises them on how to shore up defenses more effectively in the event a real criminal comes knocking.


Opinion: How safe is your customer identity data?

By Anton Koren | 14 July, 2011 22:52

Some of the world’s largest corporations have recently fallen victim to hacking attacks and identify data theft, while other online businesses have been compromised and sidelined for days or weeks, losing millions of dollars in revenue and suffering significant reputational damage. It’s never been more important for companies to act in order to avoid becoming the next victim of identity data theft.

Vendor View: Where's the risk in a recession?

By Anthony Turco | 05 August, 2009 11:20

A financial crisis is not the time for organisations to become lax about the value of their information security assets.

Good security in recessionary times

By Roger A. Grimes | 20 October, 2008 09:21

If you've had any money in the stock market, it's been a bloodbath the last few weeks. It's hard to remember that any 10-year period in stock market history has always ended up with better returns than any other investment. As financial analysts argue over whether we are already in or just headed into a deep global recession, we are facing a rough, contracting period. People with good jobs are holding on to them tighter than ever.

Five lessons learned about computer security

By Jarina D'Auria | 16 July, 2008 11:15

Reformed hacker-turned-security-consultant Kevin Mitnick served five years in federal prison for breaking into phone and software company networks. He talks about his past hacking exploits, computer security, and how he turned an illegal hobby into a useful career.

Deploying NAC: Challenges and alternatives

By Tom Barsi | 31 July, 2007 14:30

What are some of the challenges in deploying NAC? What are the alternatives for LAN security?

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Audit Management Solutions

Manage the complete audit lifecycle from audit universe identification and risk assessment to management/board reporting and quality assurance.

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.