Identity Management

Identity Management

Application Exceeds its Brief

Privacy: When the Application Exceeds its Brief

/
The recent imbroglio surrounding Facebook and its Android application exceeding its brief caught the attention of all users. In other words, the application was requesting access to information on your device that ...
Simple Cloud Identity Management

Simple Cloud Identity Management

/
Is there a simple cloud identity management solution available? It would definitely be a breath of fresh air for IT administrators drowning in the sea of complexity that is modern identity management ...
The JumpCloud Story | Whiteboard Video Presentation

The Foundation of IT: The Identity Provider

/
We often hear the phrase, “Work on what is important, not necessarily urgent.” IT organizations know this axiom all too well. In a business that is highly interruption driven and reactive, IT ...
New Gmail Confidential Mode Lets Businesses Set Expiration Dates for Emails

New Gmail Confidential Mode Lets Businesses Set Expiration Dates for Emails

/
Google has introduced a new confidential Gmail mode that allows businesses to set expiration dates for emails containing sensitive information. On 25 April, the Menlo Park tech giant announced a series of ...

Medical Device Security Standards

/
Medical devices can be vulnerable to security breaches in the same way as any other networked computing device. This may potentially affect its safety and effectiveness. The FDA (Food and Drug Administration) ...
Increasing Security through Next Generation IAM

Increasing Security through Next Generation IAM

/
Compromised identities are the number one way that hackers are gaining entry to IT networks. It is the easiest, most direct way that a bad actor can access confidential digital data. Unfortunately, ...
Managing Systems with JumpCloud | Whiteboard Video

What is Mac® System Management?

/
Managing modern system environments has never been more complicated. With so many Mac® (and Linux®) systems now being used in organizations, IT must figure out how to gain control over these devices ...

SSD Advisory – TrustPort Management Unauthenticated Remote Code Execution

/
Vulnerability Summary Multiple vulnerabilities in TrustPort’s management product allow remote unauthenticated attackers to cause the product to execute arbitrary code. TrustPort Management “offers you an effective and practical way to install centrally, ...
Cloud IAM Protocols + Architecture | Whiteboard Video

Enabling Compliance through Cloud Identity Management

/
There might not be a more important activity in an IT organization than compliance. Today’s business climate is rapidly shifting to value security and privacy for individuals and businesses. IT organizations need ...
Is There an Open Source Active Directory?

Is There an Open Source Active Directory?

/
Microsoft® Active Directory® is one of the most popular IT management tools on the planet. However, the IT landscape has significantly changed since Active Directory was built. So, IT admins are wondering, ...
Loading...