Corporate Partners

Identity Management News, Features, and Interviews

News

Security is “a massively complex topic” - CA World

Security is “a massively complex topic,” according to Mike Gregoire, CEO of CA Technologies, who cited considerations including transparency (telling people how you will use the data you collect), protection (sadly, the bad guys seem to be smarter than the good guys, so organisations need to work together and share information about compromises) and identity (so data can be protected without frustrating bona fide users).

Stephen Withers | 17 Nov | Read more

More Identity Management news

Slideshows

More Identity Management slideshows

Features

It Wasn’t Me, It Was Bennett Arron

So, Identity Theft. What is it really? Well, I’m glad you asked. It’s basically when your personal details are used fraudulently to open accounts or obtain documentation in your name. This could result in debts being accumulated, for which you would initially be accountable – until you prove yourself innocent.

Bennett Arron | 11 Jul | Read more

Novell, CA push to secure identity, security in cloud

Two major identity management companies are forging ahead with products designed to satisfy what a cloud-computing consortium calls one of the trickiest problems preventing secure and automated connections between internal IT infrastructures and external service providers: identity and authentication.

Kevin Fogarty | 07 Aug | Read more

Free Tools to Send Anonymous Messages

Whether it is for an investigation, a whistle-blower statement, a prank or just extreme paranoia, you may have a need for anonymously sending messages. The following five tools provide an easy to use way to communicate incognito with Internet surfing, emails, phone calls and text messages. While these tools have their limitations, they do provide an Investigator a great way to hide his identity, gather intelligence, and communicate secretly when needed.

Brandon Gregg | 18 Jun | Read more

Social Engineering: The Fine Art of BS, Face to Face

Chris Nickerson is willing to push it about as far as a person can go when it comes to security assessments. The founder of Lares, a security consultancy in Colorado, Nickerson conducts what he calls "Red Team Assessments" for clients. He is paid to try and dupe a client, and the client's employees, to give them a clear picture of the weak spots in their security plan. He then advises them on how to shore up defenses more effectively in the event a real criminal comes knocking.

Joan Goodchild | 08 Jun | Read more

More Identity Management features

Opinions

Identity governance: It’s all about the people

New technologies like bring your own identity (BYOI) provide the agility that organisations need to compete in the digital economy, as Jan Zeilinga demonstrated in last month’s blog. But let’s not forget that getting the house in order is an important prerequisite to going “digital”. Employees and contractors need access to the right information to do their jobs, and organisations need to ensure that digital assets are used appropriately.

John Havers | 10 Dec | Read more

Dispelling Common Myths Surrounding UTM

Unified Threat Management (UTM) has become popular among organisations since its emergence over five years ago. The security solution gained traction with its all-in-one approach, combining several security tools into a single device. Running UTM also saved companies, especially the smaller ones time, money and manpower. Most UTM today include a firewall, intrusion detection system (IDS), virtual private network (VPN), anti-malware, anti-spam, content and web filtering, while some vendors include other features such as advanced routing.

Wana Tun | 03 Oct | Read more

Opinion: How safe is your customer identity data?

Some of the world’s largest corporations have recently fallen victim to hacking attacks and identify data theft, while other online businesses have been compromised and sidelined for days or weeks, losing millions of dollars in revenue and suffering significant reputational damage. It’s never been more important for companies to act in order to avoid becoming the next victim of identity data theft.

Anton Koren | 14 Jul | Read more

More Identity Management opinons

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place