Stories by Katherine Walsh

Making a business case for identity management

Over the past couple years, identity management technologies, including provisioning, web access management and directory services, have been joined by an emerging set of technologies that involve role management, identity audit and governance, and entitlement management. These technologies can play a key role in meeting both business requirements related to auditing and reporting, and security requirements regarding user access to sensitive applications and information.

Katherine Walsh | 25 Apr | Read more

Secure locations

Secrets aren't advertised; they are protected. The US government keeps some of the biggest secrets of all -- the exposure of which might pose a threat to national security -- in places where the name hides nothing: a Sensitive Compartmented Information Facility (SCIF). But the buildings carrying the SCIF label are made to hide everything.

Katherine Walsh | 30 May | Read more