Joel Snyder, Ph.D., is a senior IT consultant with 30 years of practice. An internationally recognized expert in the areas of security, messaging and networks, Dr. Snyder is a popular speaker and ...
Head of Standards for Strata Identity, former Burton Group analyst and technology executive at Chase Manhattan Bank (now JPMorgan Chase). Heterogeneous environments are a fact of life in enterprise IT ...
In a person-to-person business transaction, when the other person doesn't know you or know who you are, she may accept credentials that vouch for your identity. Identity management in computer ...
A critical finding in our recently released benchmark, “Extending the Enterprise,” is that securing a data center effectively requires that every element within the data center – from switches and ...
Have you ever pondered the transformative impact of artificial intelligence on the realm of identity and access management (IAM)? As someone who has spent over 15 years helping companies navigate the ...
In the context of cryptocurrencies, digital identity management refers to the safe handling and authentication of user identities within blockchain networks. Since cryptocurrencies are anonymous and ...
As passwords are increasingly viewed as security liabilities, Identity Management solutions are picking up the slack. Keeping track of user names and passwords sounds easy, but it is not. In a world ...
Speed, agility, responsiveness; these are all terms frequently bandied about when today’s businesses are talking about their needs. In the world of digital transformation, along with increasing ...
As we are all aware, we are living in the era of the “selfie.” Like them or loath them, they are filling the cloud like billions of droplets of water. In 2016, Google had 24 billion selfies uploaded ...
Last week’s European Identity Conference was, as always, a wonderful look at not only European advances in identity management, but what’s happening worldwide. I had the opportunity to host panel ...
Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now Identities are one of the most attacked ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results