User ID Management Reports

Computer Weekly – 5 July 2022: How to get the right level of cyber insurance
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how the market for cyber insurance is evolving and how to avoid buying the wrong level of cover. We find out what role hydrogen technologies could play in reducing datacentre carbon emissions. And we hear how a 125-year old bicycle maker is embracing digital innovation. Read the issue now.
Posted: 04 Jul 2022 | Published: 05 Jul 2022

TechTarget ComputerWeekly.com

Identity trends for 2023
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Identity's place in the attack chain is driving the shift of identity responsibility from IT operations to security. In this e-guide, read about our identity predictions for 2023, how organisations can tame the identity sprawl, and why identity security should be at the core of ASEAN's digital economy.
Posted: 01 Mar 2023 | Published: 02 Mar 2023

TechTarget ComputerWeekly.com

Preventing identity theft in a data breach
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
Posted: 08 Feb 2021 | Published: 20 Oct 2020

TechTarget ComputerWeekly.com

Computer Weekly - 16 November 2021: How cosmetics retailer Lush authenticates with ease
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how Lush has modernised authentication, governed by a desire to care for customer data. We talk to Nasa's CDO about data as a strategic asset. And we foreground a call for the government and the Post Office to compensate Horizon victims without delay. Read the issue now.
Posted: 12 Nov 2021 | Published: 16 Nov 2021

TechTarget ComputerWeekly.com

Secure Access for the Identities Driving Your Key Initiatives
sponsored by CyberArk
WHITE PAPER: Learn five ways to protect cloud and digital initiatives from identity-related attacks by securing users’ access to applications and more in this whitepaper.
Posted: 22 Nov 2023 | Published: 22 Nov 2023

CyberArk

When Your IAM Policy Encounters the Internet of Things
sponsored by Unisys
EGUIDE: Learn how to manage the interactions of identity and access management technology, cloud and virtual environments, and the IoT in your company.
Posted: 17 Oct 2016 | Published: 12 Oct 2016

Unisys

Your Guide to MFA
sponsored by HYPR
EGUIDE: Many IT departments want to enforce multifactor authentication (MFA) on corporate content because the more layers of authentication a user has to go through means more data security. Explore this expert e-guide to gain insight into how companies are implementing MFA strategies and how biometrics plays a role in MFA security.
Posted: 14 Mar 2018 | Published: 09 Mar 2018

HYPR

Identity and Access Management (IAM) 101
sponsored by Beta Systems
EGUIDE: Identity and access management (IAM) is critical for provisioning (or restricting) user access to certain data, applications and networks – but how exactly does IAM work? And what steps can be put in place to ensure its effectiveness? Read this exclusive e-guide to find out.
Posted: 02 Aug 2022 | Published: 29 Jul 2022

Beta Systems

Computer Weekly - 19 October 2021: Making the case for and against police use of facial recognition technology
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the Met Police enhances its facial recognition capabilities, we examine the pros and cons of law enforcement use of the technology. Three in five IT professionals want a new job – is there a tech exodus in the industry? And we take an in-depth look at the growth of the Nordic datacentre sector. Read the issue now.
Posted: 17 Oct 2021 | Published: 19 Oct 2021

TechTarget ComputerWeekly.com

How Can Privileged Access Accounts Be Managed in Large Companies?
sponsored by One Identity
EGUIDE: According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
Posted: 20 Nov 2017 | Published: 13 Nov 2017

One Identity