identity management - News, Features, and Slideshows

identity management in pictures

  • In Pictures: CSO's Identity Driven Access Management Round Table

    It's the centenary of the commencement of World War One. Back then, there were borders to protect. The soldiers knew who they were fighting and there were very few incursions where one side crossed a border undetected. Today's battles are different. The bad guys are stealing the good guys’ passwords and identities to get access to whatever they want. And they often wait weeks or even months before revealing their true objectives.

    22 Oct | View galleries

News about identity management
Features about identity management
  • Novell, CA push to secure identity, security in cloud

    Two major identity management companies are forging ahead with products designed to satisfy what a cloud-computing consortium calls one of the trickiest problems preventing secure and automated connections between internal IT infrastructures and external service providers: identity and authentication.

    Kevin Fogarty | 07 Aug | Read more

  • Tools to identify anonymous users online

    After posting 5 Free Ways to Track Online Leaks of Information, I received numerous requests asking how to identify the online source leaking the confidential company information. Here are some techniques a corporate investigator can use to identify anonymous users online.

    Brandon Gregg | 07 Jul | Read more

  • Your Identity: 'Costanza Style'

    Your identity is like George Costanza's wallet. Really. Think about it. Do you remember the classic Seinfeld episode? The one where George wouldn't give up his ever-expanding wallet filled with store credit cards, Irish money, a coupon for an Orlando Exxon gas station and several Sweet and Low packets. This, in spite of the obvious physical pain it caused and the security threat all of that imposed.

    David Miller | 11 Feb | Read more

Whitepapers about identity management

  • Security 101

    Security 101: Industry experts have long debated which is a better defense mechanism in defending against Internet based attacks: a web application firewall (WAF) or an intrusion detection or prevention system (IDS/IPS),we define the differences. Read More

  • How Google Tackles Security | Webcast