Perverse Vulnerability from Interaction between 2-Factor Authentication and iOS AutoFill

Apple is rolling out an iOS security usability feature called Security code AutoFill. The basic idea is that the OS scans incoming SMS messages for security codes and suggests them in AutoFill, ...

Multi-Factor Authentication Makes Digital Workspaces More Secure

When you add multi-factor authentication to a digital workspace, you make access that much more secure. And it?s even better if you can do it without sacrificing convenience for admins and users ...
Julie Conroy: Machine Learning and AI for Bank Security

4 Essential Things to Look for in a Fraud Detection Solution

Finding the best fraud detection and prevention solution for your organization can be challenging. Requirements from internal stakeholders and vendor fact sheets can give an overwhelming impression that your solution needs to ...
How To Set Up An Identity Provider In Minutes For Single Sign-On

When Prince Harry Met Access Management

From The Royal Wedding to top secret projects, learn how fashion designers around the globe can keep their designs safe and ensure the security of their entire company. Discover five simple steps ...
Office 365™ Integration with Identity Management

Office 365™ Integration with Identity Management

Organizations are moving to Microsoft® Office 365™ en masse. Microsoft is pushing everybody to be a customer of their cloud productivity platform, but as we all know, you can still use the ...
China’s Social Credit Score

Big Brother China’s Social Credit Score

Imagine, you’re a Chinese citizen and you walk up to the ticket counter at the railway station and ask to buy a round-trip ticket, Beijing to Shanghai. The clerk asks for proof ...
Security Boulevard
Unified Access Management for Linux

Unified Access Management for Linux

Unified access management (UAM) is a new term that has recently been created by analysts and vendors to describe a narrow view of the identity and access management (IAM) space, specifically, with ...

How Deep Learning Is Making Computers Better at Guessing Your Passwords

Recently, researchers from The New York Institute of Technology and the Stevens Institute of Technology computer science department released a paper about using a relatively new machine learning technique to make computers ...
Cloud Directory Feature Active Directory Bridge

Cloud Directory Feature Active Directory® Bridge

There has been an awakening in the identity management space—have you felt it? Star WarsTM references aside, a new player has emerged on the scene and is changing the game: the cloud ...

Identity Governance and Administration (IGA) in IT Infrastructure of Today

Identity Governance and Administration (IGA) can be considered a very important area in the management of information technology in enterprises and organizations. The level of IGA importance can be... Go on to ...
Loading...