Depending on their OAuth implementation, social media sites, such as Google, LinkedIn and Yahoo, could share users' personal information with malicious third-party websites, experts say.
identity management - News, Features, and Slideshows
Identity theft has been the top consumer complaint to the Federal Trade Commission now for 13 years running.
Dell can trump Cisco in the information-technology security market, say Dell's executives in describing how the company with its multifaceted approach will hold an edge against some powerful rivals that also include HP and IBM.
About 1 in 3 "mission-critical" applications are currently in the cloud, and this is expected to increase to 1 in 2 by 2015, according to a survey of 400 IT and business managers.
Amazon Web Services today launched Data Pipeline, a new tool designed to make it easier for users to integrate data stored in multiple disparate spots to manage and analyze it.
Whitepapers about identity management
Security 101: Industry experts have long debated which is a better defense mechanism in defending against Internet based attacks: a web application firewall (WAF) or an intrusion detection or prevention system (IDS/IPS),we define the differences. Read More
- Free Whitepaper! The 5 criteria to help you select the right analytics platform for your organization.
- Free Whitepaper! Learn how to create an analytics environment that is governed, scalable and self-serve.
- Free Whitepaper! Learn how IT is evolving from producer to enabler, and fostering collaboration around analytics.