Identity and Access Management
Identity and access management: 5 things to watch out for
CA Technologies said there were five key trends in security and identity and access management that will impact organisations and security professionals in 2015 as they compete in the application economy.
Data security and the biometric single sign-on advantage
With an increasing number of data security breaches due to weak passwords and inadequate network and data encryption systems, many organisations are considering deploying biometric single sign-on solutions for secure password and identity management, writes Arifin Hussain.
Privileged accounts the 'signature' in advanced targeted attacks: CyberArk
CyberArk has released a new report identifying the compromise and misuse of privileged accounts as a key signature common among advanced targeted cyber-attacks.
Assurity Trusted Solutions appoints Charles Fan to top post
Assurity Trusted Solutions, a wholly owned subsidiary of the InfoComm Development Authority of Singapore (IDA), has announced the appointment of Charles Fan to the role of chief executive officer (CEO).
Privileged accounts and insider threats
Dell Security’s Ang Chye Hin on how organisations can take steps to mitigate the security risks associated with privileged accounts and users.
CA Tech and NTT Com Security in identity management partnership for APAC
CA Technologies has signed an agreement with NTT Com Security (formerly known as Integralis) to host CA CloudMinder Identity and Access Management (IAM) software-as-a-service solution in the Asia Pacific region.
Fortinet advocates two-factor authentication as breaches escalate
With a recent surge in processing power and the ability to outsource password cracking to the cloud, password-only based authentication is no longer sufficient to secure your critical data, according to network security company Fortinet.
Adaptive identities coming to forefront of security: RSA
As more enterprises take up bring-your-own-device (BYOD) initiatives amidst the continuing shift toward cloud computing, identity management has come to forefront of security concerns.
Mathematician unlocks weak domain keys, Google and Microsoft affected
DomainKeys Identified Mail (DKIM) Verifiers have been found to be susceptible to abuse by attackers due to weak encryption, allowing for the spoofing of e-mails from recognized domain names.
Mozilla unveils public Persona
Public beta of online identity management system Persona has been released
Call for developers to try out the system and provide feedback
MOZILLA has released the beta version of its browser-independent online identity management system, Persona.