Stories by Katherine Walsh

How to fortify your wi-fi network users

Any CSO knows corporate LANs are inherently more secure than public wi-fi. They also know that proprietary or confidential information probably passes over wi-fi networks every day.

5 steps to an identity management business case

Over the past couple years, identity management technologies, including provisioning, web access management and directory services, have been joined by an emerging set of technologies that involve role management, identity audit and governance, and entitlement management.

[]