Management of Identity Reports

CW ASEAN November 2016
sponsored by TechTarget Security
EZINE: Small businesses in the ASEAN region could unknowingly be allowing hackers to access large corporate networks.
Posted: 08 Feb 2021 | Published: 31 Oct 2016

TechTarget Security

Computer Weekly – 23 October 2018: Where next for digital identity?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the government hands its digital identity service, Gov.uk Verify, to the private sector, we examine the history and prospects for the troubled system. Our latest buyer's guide looks at cloud-native architecture. And we compare the flash storage capabilities of the leading cloud providers. Read the issue now.
Posted: 08 Feb 2021 | Published: 19 Oct 2018

TechTarget ComputerWeekly.com

CW Europe – December 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.
Posted: 08 Feb 2021 | Published: 14 Dec 2017

TechTarget ComputerWeekly.com

Computer Weekly - 16 November 2021: How cosmetics retailer Lush authenticates with ease
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how Lush has modernised authentication, governed by a desire to care for customer data. We talk to Nasa's CDO about data as a strategic asset. And we foreground a call for the government and the Post Office to compensate Horizon victims without delay. Read the issue now.
Posted: 12 Nov 2021 | Published: 16 Nov 2021

TechTarget ComputerWeekly.com

A Certified Concern
sponsored by TechTarget Security
EBOOK: Can that CA be trusted? Certificate authority risks are many, but since there's no avoiding SSL and TLS, at least for now. Here's how to increase CA security.
Posted: 21 Sep 2016 | Published: 20 Sep 2016

TechTarget Security

Who needs security orchestration, automation and response?
sponsored by TechTarget Security
EBOOK: Who needs SOAR? Only those companies with understaffed, overworked IT security teams. Or in other words; most security teams. Learn how SOAR tools can help ease the burden of required security tasks and free up security pros for more challenging IT security projects.
Posted: 17 Apr 2019 | Published: 17 Apr 2019

TechTarget Security

An Introduction to the FIDO Authentication Standard
sponsored by HYPR
EGUIDE: 63% of all successful data breaches can be tracked back to inadequate passwords, according to Verizon's DBIR. In this e-guide, security experts David Strom and Michael Cobb explore the Fast Identity Online (FIDO) Alliance and the impact it has on authentication and password protocols.
Posted: 21 Mar 2018 | Published: 19 Mar 2018

HYPR

Information Security magazine Insider Edition, April 2017
sponsored by TechTarget Security
EZINE: Managing IAM is more critical than ever to corporate security; Your IAM policy must be updated to reflect the current risks and IT advances. Discover how to tackle changes in the "identity layer" and consider other factors affecting your IAM policy. Also delve into multifactor authentication and the specific risks to cloud-based IAM tools.
Posted: 19 Apr 2017 | Published: 10 Apr 2017

TechTarget Security

Third-Party Risk Management: How to Avoid the Dangers of Weak Controls
sponsored by ModoModo
EGUIDE: If you know where the risk points are, you can request additional safeguards to protect the system and data access of trusted business partners. In this guide, security expert Michael Cobb, CISSP-ISSAP, explains how to avoid security risks and implement a third-party risk assessment plan.
Posted: 23 Feb 2017 | Published: 17 Feb 2017

ModoModo

New Data Classifications Vital to Information Governance and Security
sponsored by STEALTHbits
EGUIDE: In this e-guide, learn how 3 new data classifications are becoming vital to information governance and security.
Posted: 09 Nov 2016 | Published: 31 Oct 2016

STEALTHbits