Identity Management

Identity Management | News, how-tos, features, reviews, and videos

mobile device management
human weak link cybersecurity primary

Artificial intelligence and digital identity

What is IAM? Identity and access management explained

IAM products provide IT managers with tools and technologies for controlling user access to critical information within an organization.

blockchain in healthcare / doctor accesses one block in a chain of digital medical records

Can digital identity cure the chronically ill?

A secure, verifiable digital identity for patients would improve communication and information sharing across multiple specialists and caregivers.

continuous authentication

What is access control? A key component of data security

Access control is a method of guaranteeing that users are who they say they are and that they have the appropriate access to company data. It is a vital aspect of data security, but it has some significant enforcement challenges.

security map digital encryption identity

What is Zero Trust? A model for more effective security

The technologies that support Zero Trust are moving into the mainstream. Here's why security experts say it might be the best way to stop data breaches.

facebook workplace chat

Facebook tests stand-alone Workplace Chat app

The social network has quietly published a standalone Workplace Chat app to complement its existing browser-based Workplace enterprise networking service.

SAP sign

SAP buys Gigya to boost customer identity access management offering

SAP is giving its business software users a new way to track their customers, with the acquisition of customer identity management specialist Gigya.

solar eclipse

When identity data eclipses digital identity

Digital identity needs to be redefined as verified identity data. Identity data, using the right tools, can be used to carry out online jobs on behalf of the real me. But the right technology, aka personal data stores, need to be in...

04 insider threat

How to spot and prevent insider threats

Are departing employees taking data with them? Here’s what you need to know about detecting insider threats and better protecting your enterprise network and proprietary information.

Load More