Similar Articles |
|
InternetNews February 20, 2008 Larry Barrett |
Can Oracle's Identity Manager Tackle Compliance? Oracle on Wednesday announced the release of the latest version of its Identity Manager software, a key security and access management component of its Fusion middleware platform. |
Knowledge@Wharton |
Exploring the Links between Brand Name and Consumer Identity A successful identity-oriented marketing strategy like Nike's consists of three critical links, including the consumer, the identity and the brand. |
CRM December 2013 Ray Wang |
Why the Battle for Identity Will Affect Customer Experience Merging identities across environments is no easy task. Facebook, Google, and Twitter dominate most social log-ins. Users expect their identity to be transportable from personal to work environments. These implications carry over to customer experience. |
Knowledge@Wharton |
Family Matters: Are Fords, Hewletts and Packards Right to Exercise Their Clout? Are these founding-family members being too intrusive, wrecking the well-laid plans of professional managers and meddling in affairs that are none of their business? |
InternetNews May 20, 2010 |
Novell Offers Cloud-Based Identity Manager With this new release, Novell's identity management tools/framework cover the move of services and identity floating in the clouds, and more tools for access and security on the way. |
CIO October 15, 2003 Ben Worthen |
Identity Crisis Identity management projects promise big returns, but be prepared for long, complex implementations. |
CIO January 1, 2003 Alison Bass |
Identity Crisis If identity theft isn't already on your radar screen, this headline will put it there: 13,000 Credit Reports Stolen by Hackers. To avoid a similar disaster on their turf, CIOs should insist their company's customer data be kept in separate databases protected by a number of different security measures. |
PC Magazine October 28, 2003 Sebastian Rupley |
Lock 'Em Out Take steps to protect yourself from identity theft. |
InternetNews June 13, 2006 Sean Michael Kerner |
Novell Lets Bandit Loose The Bandit project is an open source effort led by Novell that aims to integrate disparate identity standards and projects in an effort to help create an identity system that spans the Internet. |
The Motley Fool December 30, 2004 |
Types of Identity Theft Learn what to look out for, and protect yourself! |
InternetNews February 12, 2010 |
Study Puts Identity Theft Cost at $54B in 2009 Research firm Javelin estimates that more than 11 million Americans were victims of identity theft last year, a 12 percent increase that led to tens of billions of dollars in costs. |
InternetNews February 27, 2006 Clint Boulton |
Manage Your Own Identity Online Companies like Microsoft join Harvard in the Higgins Project, which is designed to help people control their identity info online. |
AskMen.com Branden Peters |
How To: Avoid Getting Hacked Thankfully there are several ways to protect your information and identity from malicious attacks. Some are common sense and others require thought and money. |
Bank Systems & Technology February 1, 2007 Gary Greenwald |
Securing Internet Transactions Is a Top Concern at Banks Beyond the regulatory reasons driving improvements in Internet banking security, banks are also uniquely positioned to play a critical role in the broader identity management arena. |
Information Today September 23, 2014 |
LexisNexis Introduces Identity Challenges Resource LexisNexis Risk Solutions created a thought leadership platform to educate government agencies and officials about solutions to their identity challenges. |
InternetNews June 20, 2005 Clint Boulton |
Single Sign-On, The Java Way Sun's latest ID management products are designed to allow rights provisioning for partner users. |
Search Engine Watch March 22, 2010 Eli Goodman |
The Relaunch of Syfy: When Search Shapes the Brand Was this rebranding strategy a success from a search perspective? Let's dig into the data and evaluate exactly what happened. |
Inc. August 2003 Robert X. Cringely |
They've Got Your Number Identity theft using a combination of computer technology and government information is a major crime just waiting to happen. |
InternetNews January 24, 2005 Clint Boulton |
Sun ID Software Takes to the Audit Trail The systems vendor pads its ID management portfolio with a compliance-oriented software package. |
Entrepreneur August 2007 Jacquelyn Lynn |
Small Business Owners Risk Identity Theft Insuring your identity makes it easier to get it back. |
InternetNews March 31, 2010 |
FBI, DOJ Identity Theft Programs Fall Short A new report from the DOJ's Office of the Inspector General says the government is making a big mistake by not making ID theft prevention and prosecution a top priority. |
InternetNews July 23, 2010 |
Oracle Offers New Identity Management Suite Oracle Identity Management 11g is designed to "radically" simplify application security. |
PC Magazine July 1, 2003 Neil J. Rubenking |
Password-Protect the Outlook Express In-Box Is there a way to make the Outlook Express in-box private, using a password? |
InternetNews July 19, 2007 Roy Mark |
DoJ Sends ID Theft Bill to Congress The Bush administration sent proposed legislation to Congress today that aims to update and improve federal identity theft laws. |
InternetNews December 20, 2005 Clint Boulton |
Oracle Tops Off ID Management Suite With its past year's acquisitions fully integrated, Oracle proudly releases its Identity and Access Management Suite to help corporations address security concerns. |
InternetNews August 9, 2006 Michael Hickins |
Novell's Sentinel Watches Over Your Network Novell incorporates the Sentinel security perks from its e-Security purchase. |
InternetNews May 24, 2005 Erin Joyce |
Microsoft Moving From Passport to InfoCard Microsoft releases its latest Web services platform, offering an olive branch on interoperable identity management to partners. |
InternetNews May 12, 2010 |
ForgeRock Extending Sun's OpenSSO Platform With a gaggle of Sun veterans on staff, ForgeRock is looking to expand the OpenSSO single sign-on and identity management platform, rebranded as OpenAM. |
InternetNews January 12, 2009 Richard Adhikari |
Vendors See More DLP with ID Management CA's recent acquisition is a sign of more product adds to come. |
InternetNews October 27, 2005 David Needle |
Sun Looks to Capitalize on 'Perfect Storm' Sun Microsystems is quickly establishing itself as a leader in identity management solutions. |
InternetNews April 23, 2007 Roy Mark |
A New Fight Against ID Theft Improved cyber security, increased law enforcement and public education top the recommendations of President Bush's Identity Theft Task Force plan issued today. |
T.H.E. Journal March 1, 2010 Charlene O'Hanlon |
Identity Scramble An identity management system can catch potential mistakes that could put your district at risk. |
InternetNews November 16, 2005 Clint Boulton |
Oracle Dual Buy Plugs ID Holes Oracle made a bid to make its identity management portfolio the strongest of its rivals, acquiring privately held specialists Thor Technologies and OctetString for an undisclosed sum. |
Wall Street & Technology April 14, 2006 |
Identity Fraud Is Finding Fewer U.S. Victims Despite a rise in phishing activity and the increased regularity of reported data breaches, instances of identity fraud in the United States actually decreased in 2005. |
Bank Systems & Technology March 7, 2005 George Hulme |
May I See Some ID, Please? Identity theft continues to be consumers' top complaint, and ID theft-related complaints are on the rise. Bank-related identity theft comprised 18 percent of all ID theft complaints. |
Fast Company Neal Ungerleider |
MasterCard: Retailers Can Use "Pay-By-Selfie" Starting 2016 MasterCard is rolling out a "Pay By Selfie" feature that allows retailers to verify an online shopper's identity using a photo of their face. |
Bank Technology News January 2008 Michael Dumiak |
Database: What's In a Name? To hear independent analysts and software vendors tell it, the quality of data is getting worse. Isolating, cleaning up and keeping accurate records is much more difficult than current bank identity management systems can handle. |
Bank Systems & Technology July 12, 2007 Larry Greenemeier |
Link Between Data Breaches And ID Theft Unclear, GAO Reports A U.S. Government Accountability Office report indicates that while the amount of information lost or stolen is disturbing, it's difficult to prove that these breaches lead to identity theft. |
Bank Technology News January 2003 Mark Bruno |
A New Breed Of Criminals Identity heists could drain $500 million this year. Staying ahead of the thieves may be the only way to curb the rise of identity thefts. |
PC Magazine May 1, 2009 Matthew D. Sarrel |
Identity Theft: It's Out of Your Hands The most important thing you have is you, right? And online, you are your identity. If xyz.com doesn't value you enough to keep you safe, then does that company really deserve your business? |
PC Magazine November 30, 2004 Neil J. Rubenking |
Closing a Hole in OE Identity Protection The mail client in Windows 9x versions can leave your correspondence unprotected. |
Fast Company April 2000 Keith H. Hammonds |
Grassroots Leadership - Ford Motor Company "We want people at all levels who will take risks and who can make decisions." |
InternetNews February 16, 2006 Tim Scannell |
IBM Takes Holistic Security Stance IBM Corp. this week restructured nearly its entire portfolio of security products and services to provide a more strategic and proactive approach to protecting computer systems and users from abuse, unauthorized access and identity theft. |
InternetNews July 15, 2004 Roy Mark |
Identity Theft Law Hits Back at 'Phishers' The Identity Theft Penalty Enhancement Act, signed into law by President Bush, mandates federal prison terms for using a false identity in the commission of a felony. |
InternetNews August 9, 2010 |
Microsoft Adds Single Sign-On to Azure The latest update to Microsoft's Azure AppFabric cloud-computing platform includes support for a harmonized online identity with single sign-on support for multiple credential providers. |
InternetNews June 1, 2004 Jim Wagner |
Sun Consolidates ID Management Systems With the help of its WaveSet assets, Sun looks to stay ahead of the ID Management pack with a combo of user provisioning and meta-directory features. |
Bank Technology News December 2003 John Adams |
By the Numbers Identity fraud should be a top-five business priority for line-of-business decision-makers at retail financial institutions. Growth rates are indeed troublesome. |
InternetNews June 24, 2005 Clint Boulton |
BMC Integrates Goods For ID Ease The management software maker released a suite that enables single sign-on access and user provisioning. |
PC World October 2002 Anne Kandra |
Don't Let Them Steal Your Good Name Identity theft is skyrocketing -- and it's even being used to fund terrorism. The Web can be a real boon for identity thieves, helping them find information about victims and profit from the crime. |
HBS Working Knowledge June 20, 2005 Mallory Stark |
Creating a Positive Professional Image As Harvard professor Laura Morgan Roberts sees it, if you aren't managing your own professional image, others are. Here are strategies to take a proactive approach to managing your image. |