With the most recent draft of its Digital Identity Guidelines, NIST revised many of its federal recommendations regarding passwords and access management.
To effectively manage your IoT population, you must understand where your devices are, what they do, who is using them and how they connect to the network.
Tourists should follow these travel security best practices to protect their devices and data from cybercriminals, especially in foreign countries.
Security professionals must leverage new, risk-based approaches to identity management to keep up with the rapidly expanding digital landscape.
If you're writing down your passwords on adhesive notes or in a journal, you might need a refresher on password security best practices.
Fraudsters have rendered traditional authentication factors — something you know, something you have and something you are — ineffective.
Multifactor authentication, a critical component of identity and access management, has been described in literature since Shakespeare's time.
Blockchain has the potential to revolutionize the way businesses conduct financial transactions in the next few years, according to security experts.
User education and online safety training can be invaluable weapons against cyberthreats, especially for IT teams that are short on resources.
IAM Feeling Good? What CISOs Should Know About the Feeling of Identity and Access Management Solutions
Identity and access management (IAM) is critical, but an inconvenient authentication process makes for a lousy user experience.