Identity and Access Management | News, how-tos, features, reviews, and videos
Explore related topics
A software program shipped with some Samsung mobile devices allows access to the file system through the modem
The problem affected Amazon.com's iOS and Android mobile apps
Despite big-name support, newly finalized OpenID Connect protocol is a security building block, not a silver bullet
Three in four have no processes for managing keys that provide access to critical servers
Fortinet survey reveals that the two generations think alike about passwords, privacy, and online marketing
Everyone wants to avoid being the next Target. Brian Milas, CTO at Courion, explains how to use the rich data generated by identity and access control solutions to reduce risk
Even with the right vendor tools, domain renaming is fraught with gotchas. Turn to the IT community for help getting the job done
The company was working on making log-in authentication on a mobile phone easier to use
User data was stolen, though credit card information remained intact, Kickstarter said
A self-replicating program infects Linksys routers by exploiting an authentication bypass vulnerability