Identity Management

Identity Management

Company Embedded Password-Stealing Malware into Installer as Part of DRM Efforts

Company Embedded Password-Stealing Malware into Installer as Part of DRM Efforts

/
A company embedded password-stealing malware into an installer as part of its digital rights management (DRM) efforts to combat software pirates. On 18 Sunday, Reddit user crankyrecursion spotted the malware hiding within ...
Managed IdP

Managed IdP

/
As IT organizations make the shift to the cloud, many are asking whether a managed identity provider (IdP) is possible. This is because the IdP is one of the most... The post ...
Virtual Directory Services

Virtual Directory Services

/
Directory services have long been on-prem pieces of IT infrastructure. However, many IT admins have found themselves looking for a cloud alternative. The question is, is it possible to have... The post ...
Russian hackers sentenced to prison in US for compromising 160 million credit cards

Russian hackers sentenced to prison in US for compromising 160 million credit cards

/
Two Muscovites have been sentenced to years in prison for their roles in the biggest data breach conspiracy ever prosecuted in the United States. Three co-conspirators are still at large. Vladimir Drinkman, ...
Can I Replace AD with OneLogin®?

Can I Replace AD with OneLogin®?

/
Web application single sign-on (SSO) solutions are abundant in the enterprise today. Cloud applications are helping organizations work faster and more efficiently, so SSO vendors such as OneLogin® are helping... The post ...
Virtual Azure® Active Directory®

Virtual Azure® Active Directory®

/
Admins have been looking for a cloud version of Active Directory® for a while. Many think of Azure® as just that. But is a virtual Azure Active Directory instance really... The post ...
Is Active Directory® or OpenLDAP™ Better?

Is Active Directory® or OpenLDAP™ Better?

/
It’s an age old question – when looking for a directory solution, is Active Directory® or OpenLDAP™ better? This question has been asked frequently over the past two decades, and... The post ...
Case Study: Centralizing IAM, Including Samba File Servers

Case Study: Centralizing IAM, Including Samba File Servers

/
Identity and Access Management (IAM) is at the core of an IT admin’s responsibilities. Ensuring that the right users have access to the right resources is critical not just for... The post ...
SaaS Identity and Access Management (IAM)

SaaS Identity and Access Management (IAM)

/
Identity and access management is one of the most important capabilities in IT. In our increasingly connected world, controlling access to digital assets has never been more critical. The rate... The post ...
Local Browser Wins Olympic Gold for Worst Security

Local Browser Wins Olympic Gold for Worst Security

/
by Amir Khashayar Mohammadi Nearly every web browser comes equipped with a built-in password manager. Combined with all its other inherent vulnerabilities, this makes the local browser an even more attractive target ...
Loading...