identity

Investing in identity management

Investing in identity management

More efficient management, more productive staff and improved data security; just some of the advantages of Identity Management. On the other hand it can often involve high implementation costs and levels of project complexity. Only consistent ROI calculations can accurately define the benefits of such a solution. While it is relatively easy to establish concrete ROI criteria for the topic of efficiency, it is much more complicated to do so for the topic of security.
Dr. Martin Sep 26 2005 11:37AM Security
More spyware used in identity theft

More spyware used in identity theft

Spyware is increasingly being used by criminals to sniff out user passwords and log keystrokes, according to new research.
René Millman Sep 15 2005 3:12PM Security
Identity theft operation unearthed

Identity theft operation unearthed

Sunbelt Software researchers say they have uncovered what appears to be a massive online identity theft ring, which is under investigation by the FBI.
Marcia Savage Aug 5 2005 7:29PM Security
BMC ups channel recruitment drive

BMC ups channel recruitment drive

Enterprise software vendor BMC wants more partners to help it drive into the identity and access management market.
Fleur Doidge Jun 24 2005 1:00PM Software
Liberty Alliance tackles identity theft

Liberty Alliance tackles identity theft

The Liberty Alliance, a consortium working to develop an open standard for federated network identity, has branched out with a new effort to fight identity theft.
Marcia Savage Jun 15 2005 12:29PM Security
The roadmap to identity management

The roadmap to identity management

What does Identity and Access Management (I&AM) really mean to a business? The answer varies depending on who you talk to. For example, consider the viewpoints of the three board-level people most directly involved in decisions on any I&AM investment: the CEO, CFO, and CIO/CTO.
Stuart Okin Jun 3 2005 12:27PM Security
Complying with identity management

Complying with identity management

In recent years a series of laws, regulations and standards have been introduced in Europe and North America, which directly or indirectly make new demands on companies’ IT security and IT risk management. Whereas in the past IT managers and security personnel largely autonomously determined a company’s IT security policy, IT administrators are now faced with the necessity of analyzing the relevant industry-specific regulations and implementing these in a range of concrete measures.
Dr. Martin May 31 2005 11:06AM Security
Debate: Two-factor authentication access control will not prevent fraud and identity theft

Debate: Two-factor authentication access control will not prevent fraud and identity theft

Bruce Schneier May 13 2005 12:26PM Security
Feinstein calls for more laws to prevent identity theft

Feinstein calls for more laws to prevent identity theft

In the wake of the latest security breach compromising personal data, U.S. Sen. Dianne Feinstein (D-Calif.) joined law enforcement, consumer groups and identity theft victims to urge Congress to beef up protection of people's confidential data.
Marcia Savage Mar 30 2005 8:20PM Security
The industry’s identity crisis must be solved

The industry’s identity crisis must be solved

There was definitely a penitent feel to the RSA Conference in San Francisco. Speakers such as Bill Gates, John Thompson of Symantec and Art Coviello of Computer Associates all tacitly admitted that the industry has failed to deliver what users need.
Ron Condon Mar 17 2005 3:08PM Security
Identity crisis? Factoring the solutions

Identity crisis? Factoring the solutions

Richard E. Mackey Jr and Jonathan G. Gossels explain why they are not convinced by the FDIC’s recent report on two-factor authentication
Richard E. Mar 15 2005 3:39PM Security
Police investigate fake IDs

Police investigate fake IDs

Computer equipment has been seized by Queensland Police, as part of a four-month investigation into fake IDs uncovered at last year's Schoolies festival.
Vivienne Fisher Mar 2 2005 1:41PM Oddware
1.2m BofA customers at risk of identity theft

1.2m BofA customers at risk of identity theft

Bank of America (BofA) said computer tapes containing U.S. federal government customer information were lost during a shipment to a backup data center.
Marcia Savage Feb 28 2005 4:23PM Security
Calculating ROI for identity management projects

Calculating ROI for identity management projects

More efficient management, more productive staff and improved data security; just some of the advantages of Identity Management. On the other hand it can often involve high implementation costs and levels of project complexity. Only consistent ROI calculations can accurately define the benefits of such a solution. While it is relatively easy to establish concrete ROI criteria for the topic of efficiency, it is much more complicated to do so for the topic of security.
Dr. Martin Nov 24 2004 2:47PM Security
UK fires up biggest ever study into identity fraud

UK fires up biggest ever study into identity fraud

The UK's biggest national investigation into identity fraud has kicked off in partnership with five of the six largest British banks and three of the four largest mobile operators. Five of the seven largest credit card issuers and two of the largest online and offline retail consumer finance companies in the country will also contribute to the study.
Robert Jaques Oct 29 2004 11:14AM Security
Identity management market remains badly fragmented

Identity management market remains badly fragmented

The market for identity management is crowded with point and multipoint solutions and is sorely lacking in end-to-end solutions for heterogeneous networks, newly published research from Yankee Group has revealed.
Robert Jaques Oct 22 2004 11:22AM Security
Identity Management: A Key Enabler of IT-Business Alignment

Identity Management: A Key Enabler of IT-Business Alignment

As technologies have improved and the value of the Internet to business has exploded because of technologies like Java and XML, the abilities of vendors to graphically and accurately represent the status of hardware, network and application components became much more robust.
Gary Holland Oct 6 2004 3:36PM Security
Identity Management – an industry need

Identity Management – an industry need

There is a lot of talk recently about Identity Management (IM) solutions not only within enterprises that have teams to assess the variety of technology solutions available, but also by industry analysts whose job it is to size up the IM market space, including vendors. Increasingly, IM is also becoming a key focus of discussion at industry and analyst conferences on IT security.
Rosa Caputo Aug 10 2004 4:58PM Security
Privacy chief calls for identity management debate

Privacy chief calls for identity management debate

Siobhan Chapman Mar 30 2004 12:00AM Telco/ISP
HP acquires Texan identity management company

HP acquires Texan identity management company

Hewlett-Packard has acquired TruLogica, a privately-held firm selling identity management systems. Terms of the deal have not been announced.
Steve Gold Mar 12 2004 3:11PM Security

Log In

  |  Forgot your password?