Identity Management

Identity Management | News, how-tos, features, reviews, and videos

telegram ceo pavel durov

Apple vs. FBI case colors European debate about securing digital identity

Although Apple does not exhibit at Mobile World Congress, the iPhone maker influences exhibiting app developers and accessory vendors and, now, debate at the show about securing digital identity.

blockchain code

IBM goes all in on blockchain, offers cloud-based service

IBM offers a cloud-based service to help businesses set up blockchain networks and test and deploy apps.

e res id card

Nasdaq to use blockchain to record shareholder votes

Later this year, Nasdaq plans to record stockholders' electronic votes on its own blockchain system for companies listed on its exchange in Estonia. By digitizing the entire process, it expects to speed and simplify the proxy voting...

victim of identity theft

Identity theft victim? This site helps you reclaim your life

A revamped government website will offer consumers personalized, step-by-step guidance to reclaim their identities and untangle compromised accounts.

social security card

A tale of two women: same birthday, same Social Security number, same big-data mess

Two Florida women were born on the same day in the same state and given almost the same name. Though no one realized it at the time, it turns out they were also given the same Social Security number.

Okta mobility management OS X login page

Okta forges ahead with new provisioning, mobility management features

Okta announced a bundle of updates for its enterprise-facing products Tuesday at its annual user conference in Las Vegas, Nevada.

Okta Platform social login page

Okta Platform gets social login integration to attract consumer-facing businesses

Okta Platform, a developer-focused offering from the identity management company, now supports using social logins, as part of the company's push to become more friendly to consumer-focused applications.

single sign on tools review 1

Google adopts single sign-on for more desktop, mobile apps

Google Apps administrators now can use single sign-on for a wider set of Web and mobile apps

USB key

LogMeIn buying password manager LastPass

LogMeIn hopes to bring even more consolidation to the single-sign-on market with the acquisition of password management service LastPass.

tented arch in a left index fingerprint

NIST sets the stage for contactless fingerprint readers

While many are hoping that biometric technologies such as fingerprint readers will one day replace cumbersome passwords, the U.S. National Institute of Technology is looking even further out.

smartphone laptop

Report: Scam phone calls up 30%

Phone fraud aimed at finance and retail companies rose by 30 percent last year, according to a new analysis of several million calls by Pindrop Security.

security fingerprints

Expert: Time to stop relying on PII for authentication

These days, the criminals often know more of our personal details than we know ourselves -- it's time to stop asking users for their personal details and to switch to more secure methods for authentication

Network resilient

6 steps to achieve cyber resilience

Slogging through the aftermath of a breachImage by DVIDSHUBData breaches and cyberattacks are now commonplace. Although the scope, severity and cost of an event varies by incident, even the smallest of them can be detrimental to a...

Do departed employees haunt your networks?

Many companies have ghosts in their systems. Employees who've gone on to a better place -- say, with better pay -- but are still wandering through company files, cloud services, and social media accounts

wordpress dot org

Unusual Wordpress attack steals login credentials

Wordpress is a common target for criminals who redirect innocent users to malware download sites -- but a new type of malware steals user login credentials instead.

Behavioral analytics vs. the rogue insider

User Behavior Analytics, its advocates say, not only detect insider threats - it can predict them. That may bring comfort to organizational leaders, but critics say it raises privacy concerns for employees.

credit cards stock photo

Researchers reveal the default password for a credit card terminal

Many users never changed the password thinking it was unique to them, so they've remained the same for decades. And here it is.

rsa conf 2015

RSAC 2015: RSA Conference (Day 4)

All this week, Salted Hash is in San Francisco for the annual RSA Conference (RSAC). Each day we'll update the blog with breaking news and other details from the show. Today we're going to talk about passwords.

Golden Gate Bridge Tower

RSA Conference 2015: Criminals targeting gaps in user awareness training

Common Phishing techniques were less effective last year, so criminals changed their game in order to adapt

Gurucul identifies cloud threats based on identity, behaviors

Gurucul is extending its identity-based threat detection to cloud-based applications with a new platform that monitors who has access to what and what they are doing with it.

Load More