with Tags:
identity
X

I wish there was an authentication algorithm like this
There was a time,
when logging in to your bank account was a simple matter of entering a user ID,
entering a password, and accessing your account. Similarly, getting
cash from an ATM, just entailed inserting your card, entering your PIN code,
and grabbing the cash. Not any more. When you access your
bank’s web page, something horrible, called ‘malware’, sits on your PC,
remembering every character you type, and sending them all to its sociopathic
owner, so that he can later rob you. When you visit your ATM, a hidden camera
records the... [More]
Tags:  authentication security online atm banking identity |
Announcing the Secure Password Reset Campaign
Announcing the Secure Password Reset Campaign to end unsafe password reset procedures on web applications. [Read this post.]
Tags:  hacktivism security identity management pwdreset |
Practical approach to Role Management
These days “role
management” or “identity and access governance” has taken the limelight for
anything related to Identity and Access Management projects. IT organizations are eager to understand
what these technologies provide, and want to ensure that these functions are covered
in any of their identity management project bids. Role management is really only a portion of
Identity and Access Governance, but its underlying benefits are clear and
compelling: better handling over access assignment growing demands,
facilitating... [More]
Tags:  modeling access identity and governance mining management security role |