So, Identity Theft. What is it really? Well, I’m glad you asked. It’s basically when your personal details are used fraudulently to open accounts or obtain documentation in your name. This could result in
debts being accumulated, for which you would initially be accountable – until you prove yourself innocent.
Bennett Arron |
11 Jul |
Two major identity management companies are forging ahead with products designed to satisfy what a cloud-computing consortium calls one of the trickiest problems preventing secure and automated connections between internal IT infrastructures and external service providers: identity and authentication.
Kevin Fogarty |
07 Aug |
The Australian Federal Police (AFP) claims to have struck a major blow to a multi-million identity fraud syndicate.
CIO Staff |
03 Jul |
Whether it is for an investigation, a whistle-blower statement, a prank or just extreme paranoia, you may have a need for anonymously sending messages. The following five tools provide an easy to use way to communicate incognito with Internet surfing, emails, phone calls and text messages. While these tools have their limitations, they do provide an Investigator a great way to hide his identity, gather intelligence, and communicate secretly when needed.
Brandon Gregg |
18 Jun |
Chris Nickerson is willing to push it about as far as a person can go when it comes to security assessments. The founder of Lares, a security consultancy in Colorado, Nickerson conducts what he calls "Red Team Assessments" for clients. He is paid to try and dupe a client, and the client's employees, to give them a clear picture of the weak spots in their security plan. He then advises them on how to shore up defenses more effectively in the event a real criminal comes knocking.
Joan Goodchild |
08 Jun |
More Identity Management features
In 2015, the Australian Government’s ‘Stay Smart Online’ initiative released a report discussing the cost of cybercrime to our small businesses.
Richard Laycock |
22 May |
Hybrid cloud is fast becoming the IT service delivery platform of choice for businesses worldwide.
Prakash Ramamurthy |
20 May |
While organisations have been under threat from ransomware for years, the attack landscape has been very narrowly focused.
Brian Baskin |
18 May |
2016 has been a tough year for IT security and the trend seems to be continuing into 2017.
Ashwin Pal |
12 May |
The stakes for protecting against ransomware are about to get higher as malicious tools evolve to target Industrial Control Systems (ICS) and threaten critical infrastructure.
Lauren Horaist |
08 May |
More Identity Management opinons