Identity and Access Management | News, how-tos, features, reviews, and videos
Explore related topics
Compromised passwords could still give hackers a launching pad to attack users if they have been used for other internet accounts
The company said the compromise was related to a security incident in 2012
Legacy ciphers such as triple-DES and Blowfish are vulnerable to Sweet32 attacks, which let attackers decrypt HTTPS sessions even without the encryption key
A furor over bugs in password managers left users in a jam. Self-proclaimed security empress Jessy Irwin clears up the confusion
The new Samsung phablet provides a full portfolio of security options that truly advance the Android cause for business
The financial industry has invested heavily in staff, processes, and technology to improve security, but some startups are taking a more innovative approach
Windows is a popular attack target for criminals and researchers alike, but Microsoft has done a good job of making it harder to target security flaws in the OS
Security is a mess. Windows 10 offers promising solutions -- with features based on Hyper-V that will fundamentally change enterprise security
SMS-based authentication is easy to implement and accessible to many users, but it is also insecure. Now NIST plans to drop it from its two-factor authentication guidelines
Eliminating passwords will take years, acknowledges the FIDO Alliance. But it says it is well on its way to a faster, easier and much more secure online authentication standard