News & Commentary

Content tagged with Identity & Access Management posted in May 2014
A Year Later, Most Americans Think Snowden Did The Right Thing
Quick Hits  |  5/29/2014  | 
On anniversary of whistleblowing, 55 percent of Americans say Snowden was right to expose NSA's surveillance program; 82 percent believe they are still being watched.
Dissecting Dendroid: An In-Depth Look Inside An Android RAT Kit
Commentary  |  5/28/2014  | 
Dendroid is full of surprises to assist it in subverting traditional security tactics through company-issued Android phones or BYOD.
eBay Breach: Is Your Identity Up For Auction?
Commentary  |  5/23/2014  | 
In a sick twist of events, the roles may just have been reversed on eBay users. Its their social media identities and data that now have the greatest value in the cyber underground.
6 Tips For Securing Social Media In The Workplace
Commentary  |  5/20/2014  | 
Empower employees by training them to be aware and secure, and in how to avoid becoming a statistic.
Apple Picking: 5 Ways to Lose (& Retrieve) Mac Data
Commentary  |  5/16/2014  | 
Apple platforms are far from invincible, as these common loss scenarios demonstrate.
NextGen Authentication: There's A Really Smart Phone In Your Future
Commentary  |  5/6/2014  | 
The mobile device is the latest platform to reinvent access controls, and it's putting enterprise IT back in the driver's seat of security and data protection.
Defending Against Identity Theft In The Military
Commentary  |  5/5/2014  | 
Our military troops are twice as likely to be victims of identity theft as the general population. The reason is in the structure of military culture.
Why Perimeter Defenses Are No Longer Enough
Commentary  |  5/2/2014  | 
When it comes to corporate information security and data protection, the new normal is "due care" in managing day-to-day operations.
How To Avoid Sloppy Authentication
Commentary  |  5/1/2014  | 
Viewing authentication as a process, not simply as an encryption or algorithm, is the key to defending corporate resources from attacks.


'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Register for Dark Reading Newsletters
White Papers
Video
456