September 19, 2016 New Google API Will Securely Verify Chrome Devices 2 min read - The new Google API allows a network service to obtain a hardware-backed cryptographic guarantee of the identities of a device and the user accessing it.
Cloud Security August 31, 2016 Out With the Old, in With the New: Are You Ready to Move to IDaaS? 4 min read - A move to IDaaS requires skill, knowledge and a small leap of faith, but the increased control over the cloud environment is well worth the elbow grease.
Identity & Access August 19, 2016 Get the Identity Governance Scoop: Interview With an Expert 6 min read - To learn more about identity governance and intelligence, we interviewed Andy Taylor, one of IBM's identity and access management specialists.
Identity & Access August 18, 2016 The Top Four Reasons CISOs Are Adopting Cloud-Based Solutions for Identity and Access Management 2 min read - As business moves to the cloud, it makes sense for CISOs to manage identity and access management functions with cloud-based solutions.
Cloud Security August 11, 2016 Cloud IAM Scenarios in Retail, Academia and Finance: Three Tips From an IDaaS Expert 2 min read - The demand for IDaaS is expanding into every industry. Retailers, universities and financial institutions can benefit from adopting cloud IAM solutions.
Fraud Protection August 5, 2016 Identity Theft and Social Media: How Are They Related? 3 min read - Social media has created many new ways for people to interact. While this can be viewed as exciting, it also leaves users vulnerable to identity theft.
Cloud Security July 28, 2016 2016 Gartner Magic Quadrant for IDaaS Names IBM a Visionary for Cloud Identity Service 2 min read - The 2016 Gartner Magic Quadrant for IDaaS named IBM as a Visionary for Cloud Identity Service, cementing its position as a leader in the space.
Identity & Access January 22, 2016 Rethink the Personal Identity Ecosystem Using Digital Identification Documents 3 min read - Digital identification documents have the potential to revamp the way people and enterprises manage and secure personal information.
Cloud Security November 4, 2015 How Can Access Management Platforms Improve Cloud Security? 2 min read - Identity and access management is essential for the strongest cloud security, but it must be done in a way that's efficient for the enterprise.
Artificial Intelligence October 19, 2015 How Cognitive Computing Supports Identity and Access Management 2 min read - The identity governance of tomorrow looks quite different from today, largely thanks to the rise of special technologies such as cognitive computing.