Security Experts:

long dotted


In an analysis of 660,000 pieces of information collected, Recorded Future found login credentials for 89 unique domains possibly belonging to government agencies.
Centrify has made enhancements in the areas of secure user provisioning, license management, single sign on (SSO) and mobile device management for Office 365 (O365).
Japan's largest mobile service provider, NTT DoCoMo, said it would replace passwords with biometric credentials on a number of its online services, in a step to move users closer to a password-free world.
RSA has unveiled a new identity and access management solution. RSA Via includes solutions for authentication, identity and access management, and identity governance.
Cryptzone launches AppGate Secure Access, a gateway solution that provides a secure tunnel between users and apps to prevent unauthorized access.
ThreatMetrix unveils Digital Identity Network, an identity protection solution based on device and behavior profiles created through the analysis of 1 billion transactions per month.
The "Re-Direct to SMB" vulnerability impacts all versions of Windows, including the upcoming Windows 10, as well as products from major software makers such as Adobe, Apple, Oracle, and Symantec.
Early Warning said on Tuesday that it has signed a definitive agreement to acquire Authentify Inc., a provider of phone-based, multi-factor authentication solutions.
The new Windows 10 operating system will allow users to sign in to a device without a password by using biometrics, including facial recognition.
Yahoo announced a new way to let users to login to their account without the need for a password. With the new features, when signing in, an on-demand password is texted directly to a user’s mobile phone.

FEATURES, INSIGHTS // Identity & Access

rss icon

Scott Simkin's picture
It doesn’t take the most advanced tools to break into the the largest corporations on the planet. Between user behavior and the types of malicious files attempting to compromise enterprises, there are a few steps you can take to reduce your risk exposure.
Travis Greene's picture
When it comes to protecting against insider threat, there can be an over-reliance on policy and automated enforcement. Access Governance is a powerful tool to reduce the insider threat, but it needs to mature to the point where it is more responsive and more automated before relying on it completely.
Travis Greene's picture
The combination of access governance and self-service access request and approval provides the best approach to strike back at the access clones.
Travis Greene's picture
Just as automation is applied to the process of Access Certification, the process of revocation needs automation to deliver an Access Governance program that not only satisfies compliance mandates, but actually reduces risk.
Tal Be'ery's picture
Passwords needs to be strong enough to resist a guessing attack, often named a "Brute-force" attack. The brute-force attack comes in two flavors: online and offline.
Eddie Garcia's picture
By default, Hadoop is not secure and simply trusts that users are who they say they are. Within real business use cases, especially when confidential and sensitive data sets are involved, restricting access to only authorized users is critical.
Jon-Louis Heimerl's picture
We all know passwords are not a great solution for securing our accounts and information. But, it is what we have right now, so we might as well make the best of them, eh? Take this quick quiz to see how secure your password is.
Travis Greene's picture
Done correctly, process automation can be used for triggering and diagnosing, with corrective actions presented as a menu of options for overworked security teams.
Travis Greene's picture
IAM is sometimes forgotten in the discussion of controls. However, it’s best to have these conversations when planning and evaluating controls, rather than after a breach.
Travis Greene's picture
Though there are unique risks associated with identity and access from mobile devices, there are also opportunities that mobile devices bring to address identity concerns.