Identity and Access Management | News, how-tos, features, reviews, and videos
Explore related topics
Today’s identity platforms are taking security beyond passwords and perimeter protection to continuous, intelligent authorization based on context
Many companies have ghosts: employees who've gone on to a better place but are still wandering through company files, cloud services, and social media accounts
Make sure your security reduces the burden on users to the minimum required to get the security you truly need
Here are the best practices to adopt for IAM as you move to the cloud
The research project ErsatzPasswords aims to stop the cracking of password hashes
Microsoft and Google are both expanding their policy management tools' reach, and IT may be caught in the middle
Research project NoCrack creates plausible decoy password vaults to confuse attackers
Innovation and collaboration go together, but to work together across platforms we need a user-controlled, independent identity scheme
Don't want your home address or other personal info published to the world? This weekend, take an hour or two to make yourself a less visible target
Lack of encryption and other security issues were found in home automation hubs that could facilitate burglary, stalking, and spying