Identity and Access Management | News, how-tos, features, reviews, and videos
For top IT security execs, losing your job is remarkably easy. All it takes is a stupid decision, a simple oversight, or poor communication.
From fundamental security mistakes and strategic shortcuts, to emerging industry trends, Change Healthcare’s security meltdown provides ample fodder for thought on how not to be the next high-profile victim.
When digital systems need access and permissions they require credentials just like human beings. These non-human identities allow many components of complex systems to work together but present significant security issues.
Two-factor authentication (2FA) goes beyond passwords to add a second layer of security to the authentication process. Organizations and users alike can better secure their data by making the shift to 2FA.
The path to eradicating this ancient protocol and security sinkhole won’t be easy, but the time has come for its complete eradication.
IAM is a set of processes, policies, and tools for controlling user access to critical information within an organization.
Biometrics has the potential to make authentication dramatically faster, easier and more secure than traditional passwords, but companies need to be careful about the biometric data they collect.
CISOs struggling to manage a diverse and complex identity access management infrastructure should start thinking about identity fabric immunity.
As attackers become more adept at defeating authentication apps and IP fencing, passkeys are a more secure and user-friendly alternative.
Generative AI can create fake documents and personal histories that fool common know-your-customer authentication practices.