Identity Management

Identity Management | News, how-tos, features, reviews, and videos

A vast network of identity avatars. [identity management]
binary eye circuits

blockchain bitcoin circuitry global

Amid privacy and security failures, digital IDs advance

Blockchain-based digital wallets could give owners control over their digital identity in a way that would eliminate the business silo systems of today.

blockchain crypotocurrency bitcoin by olgasalt getty

10 top distributed apps (dApps) for blockchain

These distributed apps are resilient and enable everything from asset tracking to identity verification — oh, and some pretty cool role-playing games, too.

access control / authentication / privileges / managing permissions

What is access control? A key component of data security

Access control is a method of guaranteeing that users are who they say they are and that they have the appropriate access to company data. It is a vital aspect of data security, but it has some significant enforcement challenges.

CSO  >  Digital identity  >  personal identity / recognition + access authentication / personal data

Taxpayer First Act: Improving identity verification and modernizing the IRS

With citizens' PII at risk, some federal agencies like the IRS are moving away from knowledge-based verification. It's time for them all to follow suit.

login credential - user name, password - administrative controls - access control - single sign-on

Best tools for single sign-on (SSO)

SSO can reduce the risk of weak passwords and administrative overhead associated with managing account access. These are the top single sign-on solutions to consider.

mobile device management

Google, Hyperledger launch online identity management tools

The new tools enable mobile-based options for employees to sign into corporate applications or create self-sovereign identities, access to which they control.

human weak link cybersecurity primary

What is a supply chain attack? Why you should be wary of third-party providers

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

Artificial intelligence and digital identity

What is IAM? Identity and access management explained

IAM products provide IT managers with tools and technologies for controlling user access to critical information within an organization.

blockchain in healthcare / doctor accesses one block in a chain of digital medical records

Can digital identity cure the chronically ill?

A secure, verifiable digital identity for patients would improve communication and information sharing across multiple specialists and caregivers.

Load More