Tag "Identity Management"

Back to homepage
Software

Building shared digital identity using blockchain technology

I previously described challenges both consumers and organizations face when it comes to user identity and how a shared digital identity can reshape digital trust as we know it.In an

Cloud

Safeguarding hybrid-cloud infrastructures through identity privilege management

Most enterprises have embraced the advantages a cloud infrastructure can bring to their computing, storage, network or other needs, and many are juggling multiple cloud platforms, some private and other

Software

You are who you say you are: Establishing digital trust with the blockchain

Over the last few years, blockchain use has gained popularity driven partly by the interest in cryptocurrency, but mostly with the growing understanding of what distributed ledger technology can enable through decentralization

Identity Theft

What is IAM? Identity and access management explained

Identity and access management (IAM) in enterprise IT is about defining and managing the roles and access privileges of individual network users and the circumstances in which users are granted

Software

Why identity verification needs to be a part of your digital transformation strategy

Smartphones and tablets are an indispensable part of daily life, and consumers expect nothing less than a streamlined mobile experience. With this in mind, businesses are focusing on digital transformation efforts in

Software

Application Security: How to Secure the Many Apps in Your Enterprise

Today’s enterprises are struggling to secure their applications. With thousands of applications in use and new threats emerging daily, large organizations face a monumental task. Compounding matters is the fact

Identity Theft

Machine Identity Failings Expose Firms

Nearly all IT decision makers believe that protecting machine identities is as important or more important that human identity management, but most struggle to deliver that protection, according to a

Hardware/Network

Much More Than Just Security – The Future Of Identity And Access Management

As more organisations embark on the journey that is digital transformation, the ability to manage the digital identities is becoming more crucial — especially at a time when the Internet

Hardware/Network

Five key security tips to avoid an IoT hack

Recently, Russian PIR Bank lost $1,000,000 because of a compromised router that allowed hackers to gain entry into their local network. Why did it happen and how companies can protect themselves?  Malicious

Hardware/Network

The Two-Step Process to Fix the Internet’s Identity Problem

In today’s digital world there are nearly 23.14 billion connected devices. Employees across the globe are using these devices to do everything from check personal and corporate emails to access corporate