Cybersecurity risks posed by inadequate IAM and IT asset management are mounting. Now the National Cybersecurity Center of Excellence has drafted guidance to address banking institutions' unique risks, says Nate Lesser, the center's deputy director.
As major cloud vendors, including Salesforce, integrate identity and access management features into their platforms, security professionals must size up the role that stand-alone IAM systems will play in the long run.
Pennsylvania Chief Information Security Officer Erik Avakian explains how the commonwealth is using a $1.1 million federal grant to pilot a program to furnish single identities to residents who transact state business over the Internet.
All businesses, regardless of industry, need to manage the exploding universe of identities, devices and data that employees require to do their jobs. And the growing use of mobile devices and cloud computing means risk management and compliance is extending beyond traditional enterprise boundaries. Add regulatory...
NIST awards a total of $7 million in grants to five organizations to develop and pilot reliable and easy-to-use identity credentials that could help build trust in online commerce and boost the economy.
Iris scanning is becoming old hat for authenticating individuals entering secured facilities or crossing international borders, but it remains several years away for use in providing access to IT systems.
In the wake of Arbor Network's recent discovery of a new botnet that's brute-forcing passwords on WordPress sites, security experts, including Nick Levay of Bit9, recommend beefing up password security on web applications.
Consolidating Microsoft Active Directory isn't just a technical challenge, but a personnel one as well. Just ask Johnson Matthey's Steve Way, who had to calm dozens of administrators he labels as "masters of their own universe."
Over the past decade, the IT landscape has dramatically changed - the strategy of securing and controlling behind a firewall is no longer viable. With the rise in cloud services, mobile access, API access and social networking, users, applications and data are just as likely to reside outside the corporate network as...
This Forrester Research study examines six cases of the implementation of Identity and Access Management platforms, breaking down the benefits and costs associated with these implementations. While use cases for IAM platforms varied across these organizations, the benefits outweighed costs regardless of a focus on...