Identity Management

Identity Management

How to secure your smart home | Avast

We live in a connected world. Globally, we’ve become a tighter community, while locally, we’ve become more global. The internet has delivered on convenience, allowing anyone with a connection to see, learn ...

Tips to Stay Safe in the IoT World

Once considered a “fad,” the Internet of Things (IoT) is now here to stay. It thrives in inter-connectivity though, making it a target of malicious programs and attacks. This is especially true ...

Researchers Can Earn Up to $100K via Microsoft Identity Bounty Program

Microsoft announced its Identity Bounty Program through which security researchers can earn up to $100,000 for an eligible submission. On 17 July, Microsoft Security Response Center (MSRC) unveiled the creation of a ...

Multi-Factor Authentication Made Simple for Legacy and Custom Apps

Looking for an easier way to add multi-factor authentication (MFA) to legacy and custom applications? Look to a next-generation firewall and MFA integration to enforce it at the network layer ...
Privileged Account Management

It’s Time to Rethink Privileged Account Management

Gartner recently listed privileged account management as the No. 1 security project that chief information security officers (CISOs) should explore in 2018. Privileged users and accounts are not new to businesses or ...
Security Boulevard
Diving into Summer Vacation Security Risks

Diving into Summer Vacation Security Risks

We are in the middle of the holiday season, and while it may be the most enjoyable part of the year, it’s definitely not the safest. We all take our technology gear ...
Unified Access Management for Windows

Unified Access Management for Windows

There’s a new term that identity management vendors are throwing around. It’s called unified access management. Unfortunately, thus far, the term has been mainly used to reference centralized access to web and ...

DDoS attacks grow more popular, targeted

A new State of the Internet/Security: Web Attack report finds the number of distributed denial of service attacks to be growing, already up 16 percent over all of last year. The report ...

Realize the Significant Business Value of Identity Governance

For executive leadership it is becoming even more important to translate technology success into its value to the business. Read this blog to learn new ways you can show Identity Governance is ...
What is AWS Cloud Directory?

What is AWS® Cloud Directory?

If you’re feeling slightly confused about the new offering from Amazon Web Services (AWS®) in the cloud directory space, it’s completely understandable. The term “cloud directory” meant one thing in the past, ...
Loading...