Two states are testing new technologies that, if successful, should make it easier for citizens to securely access government services online with the side benefit of mitigating fraud and identity theft.
New personal identity verification standards issued by NIST could make it easier for individuals to access sensitive files on secured IT systems from their mobile devices.
NIST awards a total of $7 million in grants to five organizations to develop and pilot reliable and easy-to-use identity credentials that could help build trust in online commerce and boost the economy.
Iris scanning is becoming old hat for authenticating individuals entering secured facilities or crossing international borders, but it remains several years away for use in providing access to IT systems.
To address the insider threat, Jeremy Walczak of Independent Health is using a privileged identity management system. Walczak and other experts offer detailed insights on mitigating emerging threats.
In the wake of Arbor Network's recent discovery of a new botnet that's brute-forcing passwords on WordPress sites, security experts, including Nick Levay of Bit9, recommend beefing up password security on web applications.
Consolidating Microsoft Active Directory isn't just a technical challenge, but a personnel one as well. Just ask Johnson Matthey's Steve Way, who had to calm dozens of administrators he labels as "masters of their own universe."
In the wake of the NSA leak by former systems administrator Edward Snowden, how can organizations limit the amount of data access offered to those managing IT systems? Former CIA CISO Robert Bigman explains.
Organizations could choose to add iris images as an alternate biometric over fingerprints on personal identity verification cards, because, for some users, fingerprint collection can be difficult.
Spend an hour with mobile security pioneer Malcolm Harkins, chief security and privacy officer at Intel, as he answers direct questions from attendees about how to get the most from your mobile security efforts.
Attendees had the opportunity to submit questions directly to Harkins. Among the topics he...
The implementation of IPv6, the new Internet communications protocol, will have a major impact on identity and access management. EMC researcher Davi Ottenheimer explains how organizations should prepare.
Having the right log and access management tools in place - and not all tools are used by all agencies at all times - doesn't mean that the proper authorities are alerted in a timely manner to activities that could jeopardize the nation's security.
At the outset of the BYOD trend, mobile security was about protecting devices. Today, mature organizations are focused more on protecting data and ensuring proper identity and access management.
In this exclusive session, a sequel to Mobile: Learn from Intel's CISO on Securing Employee-Owned Devices, Malcolm...
A new survey reveals the willingness of consumers to accept other authentication factors beyond username and password, even if they require more work on their part.
Beyond mobile device and data security, what are the ID and access challenges facing security leaders - and how are cutting-edge organizations tackling them? CSOs Elayne Starkey and Malcolm Harkins share tips.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.