Identity Fraud: 9 Consumer Scams (and How to Stop Them)

With remote work, e-commerce activity and sophisticated breach capabilities at an all-time high, there is a perfect storm brewing. Identity fraud is not going away anytime soon.  Take a look at nine common types of identity fraud, the warning signs and some identity management advice. This way, you can reduce the risk of falling victim […]

The post Identity Fraud: 9 Consumer Scams (and How to Stop Them) appeared first on Security Intelligence.

Continue reading Identity Fraud: 9 Consumer Scams (and How to Stop Them)

A Proposed New Trust Framework for Physical and Digital Identity Interactions

As we broaden our scope of identity and consider what is required to exchange trusted personal data across physical and digital realms, community interoperability becomes even more important.

The post A Proposed New Trust Framework for Physical and Digital Identity Interactions appeared first on Security Intelligence.

Continue reading A Proposed New Trust Framework for Physical and Digital Identity Interactions

Securing User Identities With Blockchain Technology

The security world is searching for a replacement for passwords. Passwords are becoming irrelevant because they can be discovered and broken as computers gain processing power. In addition, stolen user identities are increasingly cheap and easy to come by. Any solution will require a shift in how personal information is managed and stored — and […]

The post Securing User Identities With Blockchain Technology appeared first on Security Intelligence.

Continue reading Securing User Identities With Blockchain Technology

Current Trends in Identity and Access Management: July 2017

At the midpoint of 2017, five trends are emerging in the identity and access management, and with these waves comes an opportunity for security teams.

The post Current Trends in Identity and Access Management: July 2017 appeared first on Security Intelligence.

Continue reading Current Trends in Identity and Access Management: July 2017

Securing the Digital Economy With Federated Identity Management

Security professionals must leverage new, risk-based approaches to identity management to keep up with the rapidly expanding digital landscape.

The post Securing the Digital Economy With Federated Identity Management appeared first on Security Intelligence.

Continue reading Securing the Digital Economy With Federated Identity Management

Securing Your Cloud-Based Resources: Start With These Four Areas

With cloud-based resources becoming an integral part of the enterprise, it’s time for security leaders to recognize the best ways to protect these assets.

The post Securing Your Cloud-Based Resources: Start With These Four Areas appeared first on Security Intelligence.

Continue reading Securing Your Cloud-Based Resources: Start With These Four Areas