HackDig : Dig high-quality web security articles for hacker

A ‘Star Trek’ Darkly: To Boldly, Securely and Easily Go to the Cloud

For the past 50 years, “Star Trek” has served as our template for tomorrow. While there are still hurdles to overcome before we can traverse the stars at warp speed, many of Gene Roddenberry’s visions of advanced technology have come to life. The first tricorders Bones and Captain Kirk fantastically flipped open in “Star Trek: The Ori
Publish At:2017-09-26 09:56 | Read:4397 | Comments:0 | Tags:Cloud Security Identity & Access Cloud Cloud Identity Servic

e-Signature Security Speeds Government Paperwork Along

As public administrators have learned, efficiency in government is largely a matter of executing the small things well. A saved mailing expense or avoided delay can add up to a lot more work for a lot less tax money, which is one practical definition of good government in action. One example of this process is a current U.S. Census Bureau initiative to imple
Publish At:2017-09-11 19:25 | Read:6698 | Comments:0 | Tags:Data Protection Fraud Protection Government Authentication D

Current Trends in Identity and Access Management: July 2017

Identity and access management (IAM) is a mature and well understood domain of security. That doesn’t mean it’s static. While IAM is commonly associated with security — indeed, it is an essential part of a holistic security program — many people are beginning to understand the business processes it represents as well. They therefore view it as an
Publish At:2017-07-05 12:40 | Read:3445 | Comments:0 | Tags:CISO Cloud Security Identity & Access Security Intelligence

Digital Transformation Means Infusing Identity Everywhere

Organizations are rapidly adopting new technologies such as cloud, mobile and the Internet of Things (IoT) to facilitate and accelerate digital transformation. Securing these environments means managing identities throughout the organization, and next-generation identity and access management (IAM) strategies must give IT the ability to swiftly enable cloud,
Publish At:2017-06-14 01:00 | Read:3736 | Comments:0 | Tags:Cloud Security Identity & Access Access Management Cloud Clo

Securing the Digital Economy With Federated Identity Management

As the global digital economy grows, the number of digital identities rises, and so does the need to protect and manage how personal information is collected, used and distributed. Managing digital identities is key in the online world and finding the proper way to authenticate legitimate users is one of the greatest challenges. When digital identities are n
Publish At:2017-05-02 19:00 | Read:3479 | Comments:0 | Tags:Identity & Access Authentication Digital Identity federated

Five Steps to Propel Your Privileged Identity Management Strategy to the Next Level

Privileged users are probably the greatest threats to your data security. These users literally have keys to your kingdom’s treasury of sensitive customer data and business-critical assets. Five Steps to Become a Privileged Identity Management Pro It is extremely important to properly track and monitor these privileged users because they can easily dis
Publish At:2017-03-09 17:45 | Read:2284 | Comments:0 | Tags:Identity & Access Identity and Access Management (IAM) Ident

Reimagining the Future of Identity Management With Blockchain

Every business and social transaction is carried out by people. People are known by their identities. Hence, identity drives every business and social interaction. In today’s digital age, an individual’s identity is not defined by a single attribute such as a name, address or user ID. Rather, it is a collection of attributes including, but not li
Publish At:2017-03-08 04:55 | Read:5053 | Comments:0 | Tags:Identity & Access Blockchain Digital Identity identity Ident

Okta partners with Google to secure cloud identities

Identity management vendor Okta and Google have announced a partnership aimed at getting enterprises to secure their users' identities in the cloud.As part of the deal, Google will use Okta as its preferred identity provider for Google Apps enterprise customers. Businesses that buy a ton of Apps for Work licenses will also be encouraged to use Okta's ser
Publish At:2016-08-30 18:25 | Read:3090 | Comments:0 | Tags:Security Cloud Computing Identity Management Software as a S

Use Tor? Riffle promises to protect your privacy even better

Privacy-minded people have long relied on Tor for anonymity online, but a new system from MIT promises better protection and faster performance.Dubbed Riffle, the new system taps the same onion encryption technique after which Tor is named, but it adds two others as well. First is what's called a mixnet, a series of servers that each permute the
Publish At:2016-07-16 01:15 | Read:2213 | Comments:0 | Tags:Security Privacy Encryption Identity Management

IDG Contributor Network: Protecting yourself from Google’s protection racket

About a week ago at Google I/O, Google said it would begin testing in June an alternative to passwords. People have been talking about eliminating passwords for years. They’re hard to remember, particularly when one has dozens of them. Some people have hundreds.And people tend to mismanage them — the classic sticky note on the side of the monitor is only
Publish At:2016-06-01 02:35 | Read:2942 | Comments:0 | Tags:Security Biometrics Cloud Security Identity Management Mobil

IDG Contributor Network: Think you don’t have a social media governance problem? Neither did this football player

So who has access to your social media accounts? It’s a question that many CIOs probably don’t ask themselves very much or at all. However, we just experienced one of the most highly publicized and bizarre social media gaffes during the 2016 NFL Draft. Someone might say this is simply an isolated incident in the sports world, but a strategic CIO, thinkin
Publish At:2016-05-16 21:35 | Read:2613 | Comments:0 | Tags:Social Media Governance Security Identity Management Privacy

Slack is letting its users take their chat credentials to other apps

Slack is offering its users a new way to sign into other applications. The company announced Tuesday that it has launched a new "Sign in with Slack" feature that lets people use their login for the chat app to sign in to participating applications. Developers of applications like Quip can now enable their users to sign in with Slack credentials, which ca
Publish At:2016-05-10 19:35 | Read:4162 | Comments:0 | Tags:Collaboration Identity Management Security Productivity Soft

IDG Contributor Network: Blockchain technology: hype or reality?

There's been a lot of coverage in the technology press recently about an emerging technology garnering a lot of interest in multiple industries: blockchain, and it's ecosystem. There are still some limitations with the technology before it is widely accepted and deployed, but in some industries (for example, banking), initial testing has proven to be suc
Publish At:2016-04-23 07:50 | Read:2835 | Comments:0 | Tags:Security IT Industry Identity Management Cloud Computing

IBM goes all in on blockchain, offers cloud-based service

IBM is betting big on blockchain secure-records technology taking off beyond its traditional use in bitcoin and other financial transactions. The company is now offering a cloud-based service to allow developers to set up blockchain networks and test and deploy related apps.IBM announced a flurry of blockchain-related initiatives Tuesday, including devel
Publish At:2016-02-17 02:00 | Read:3843 | Comments:0 | Tags:Security Identity Management Cloud Computing Cloud

Identity theft victim? This site helps you reclaim your life

The Federal Trade Commission yesterday unveiled a revamped online hub where victims of identity theft can file complaints and receive a personalized recovery plan to regain control of their personal and financial information and accounts.[ Related: Identity theft hit 7% of U.S. population last year ]At IdentityTheft.gov, consumers can navigate through a
Publish At:2016-01-29 23:55 | Read:3072 | Comments:0 | Tags:Security Data Protection Identity Management Government


Share high-quality web security related articles with you:)


Tag Cloud