Security Experts:

long dotted


Malicious actors exploiting old vulnerability in Cisco WebVPN to modify login pages and steal credentials, says Volexity.
Dell announced the availability of Dell One Identity Manager 7.0, a modular and integrated platform designed to help organizations unify security policies and improve agility.
In this live webcast, experts from Imperva and Centrify will share best practices on enabling the safe and productive use of cloud apps.
WordPress 4.3 Billie has been released. The latest version introduces new features and enhanced password security.
Dropbox customers can now use USB security keys for two-factor authentication (2FA).
Enterprise technology provider CA Technologies has signed a definitive agreement to acquire privileged identity management solutions provider Xceedium for an undisclosed sum.
Centrify has unveiled expanded support for Mac OS X computers, the recently released Apple Watch, and Near Field Communication (NFC).
Biometrics-as-a-service provider HYPR announces general availability of biometric tokenization platform.
A little over half of United States-based IT leaders and a third United Kingdom-based leaders believe it would be "easy" for an ex-employee to log in and access systems or information with old passwords.
Join this interactive webcast on June 30th at 1pm ET to learn best practices for managing and governing privileged identities in the modern enterprise.

FEATURES, INSIGHTS // Identity & Access

rss icon

Travis Greene's picture
Yahoo's “Account Key” uses push notifications to their Yahoo Mail app on mobile devices. Will this securely replace passwords and two-factor authentication?
Travis Greene's picture
The true value of identity is not in creating more defense in depth, which means that identity is not the new perimeter.
Travis Greene's picture
As much fun as it is to wake up to patches waiting to be unwrapped, we don’t want the regret of “exploit Wednesday”, which is far more embarrassing than becoming a victim of a zero-day exploit.
Travis Greene's picture
Can IT security find a way to coexist with wearables faster than the first BYOD war and avoid a second war?
Travis Greene's picture
No IT organization has a seemingly unlimited budget the way that Team Oracle did in the 2013 America’s Cup race. But look closer at why spending on America’s Cup racing seems so out of control and it starts to look a bit more familiar.
Travis Greene's picture
Security teams must bear equal, if not more responsibility, for reducing the risk of credential fatigue leading to inadvertent exposure.
Wade Williamson's picture
Network administrators have to remember that they are not just the protectors of the organization – they are also the most valuable targets.
Travis Greene's picture
Just like fumbles and interceptions derail a playbook plan, there are two ways that access certifications today are insufficient.
Travis Greene's picture
Like those college recruiting compliance departments that are constantly training, monitoring, and enforcing policies, the IT compliance activity of access certifications needs to become more intelligent and real-time.
Travis Greene's picture
It’s time for targeted complexity that balances the convenience that users demand with the security that organizations need. It’s a bit like teaching a new dog old tricks.