Identity and Access Management | News, how-tos, features, reviews, and videos
Explore related topics
Stored files are vulnerable to cut-and paste clumsiness or to links embedded in shared documents
Encryption is full of weak links, from backdoors to big data
Verizon's annual data breach report says finance was the leakiest industry, followed by the public sector and retail
NEC's NeoFace Monitor face-recognition technology is being rolled out as an enterprise security solution
The Canada Revenue Agency, which reported data on 900 taxpayers was stolen, is one of the first victims to report a Heartbleed attack
The integration with Paypal makes the weakness of Samsung's authentication implementation extra serious
A new contest proposes to spur innovation in hashing methods used to secure passwords and other sensitive data
Centralized identity management in the cloud is a very good idea, but it'll go nowhere until IT resistance ends
These basic security precautions on the wired side of the network work whether you’re a small business or a large enterprise
Secusmart is also behind a new voice encryption app that could help multinational, multiplatform enterprises