As major cloud vendors, including Salesforce, integrate identity and access management features into their platforms, security professionals must size up the role that stand-alone IAM systems will play in the long run.
All businesses, regardless of industry, need to manage the exploding universe of identities, devices and data that employees require to do their jobs. And the growing use of mobile devices and cloud computing means risk management and compliance is extending beyond traditional enterprise boundaries. Add regulatory...
NIST awards a total of $7 million in grants to five organizations to develop and pilot reliable and easy-to-use identity credentials that could help build trust in online commerce and boost the economy.
New federal guidance promotes the use of key privacy and security capabilities in electronic health record systems used by healthcare providers ineligible to participate in the HITECH Act incentive program.
Iris scanning is becoming old hat for authenticating individuals entering secured facilities or crossing international borders, but it remains several years away for use in providing access to IT systems.
In the wake of Arbor Network's recent discovery of a new botnet that's brute-forcing passwords on WordPress sites, security experts, including Nick Levay of Bit9, recommend beefing up password security on web applications.
Consolidating Microsoft Active Directory isn't just a technical challenge, but a personnel one as well. Just ask Johnson Matthey's Steve Way, who had to calm dozens of administrators he labels as "masters of their own universe."
As organizations prepare to move critical workloads to the cloud, more stringent security and compliance requirements emerge. This report examines the strengths and shortcomings of existing cloud platform security technologies, and defines an approach to overcome these limitations and leverage existing technology to...
The Federal CIO Council will trim its committees from six to three to focus its efforts on IT security, portfolio management and innovation. Each committee will report to a 14-member executive committee chaired by Federal CIO Steven VanRoekel.
In the wake of the NSA leak by former systems administrator Edward Snowden, how can organizations limit the amount of data access offered to those managing IT systems? Former CIA CISO Robert Bigman explains.
Spend an hour with mobile security pioneer Malcolm Harkins, chief security and privacy officer at Intel, as he answers direct questions from attendees about how to get the most from your mobile security efforts.
Attendees had the opportunity to submit questions directly to Harkins. Among the topics he...
The implementation of IPv6, the new Internet communications protocol, will have a major impact on identity and access management. EMC researcher Davi Ottenheimer explains how organizations should prepare.