Security > Identity management

Accenture buys Australian security firm Redcore

24 August, 2016 by Dylan Bushell-Embling

Accenture has agreed to buy Melbourne-based Redcore to expand Accenture Security's capabilities in IAM and security-as-a-service.


Passwords are broken: Centrify executive

22 August, 2016 by Dylan Bushell-Embling

Visiting Centrify executive David McNeely believes it is time to address the fact that passwords are the weak link in security, responsible for the majority of data breaches.


South Australia Police choose NEC facial recognition

02 August, 2016

NEC Australia has been selected to deliver South Australia Police's (SAPOL) facial recognition system.


Standards body warns against SMS for 2FA

27 July, 2016 by Dylan Bushell-Embling

The US National Institute of Standards and Technology has advised against the use of SMS for two-factor authentication verification, and may disallow the technology altogether in the future.


61 government agencies want access to telco metadata

19 January, 2016 by Dylan Bushell-Embling

The government has disclosed that 61 agencies, including federal and state departments, regulatory bodies and even one city council, have requested access to data under the metadata retention scheme.


Two-factor authentication – 5 points you need to know

28 August, 2015

Once you have decided to implement two-factor authentication, what is the next step? With the multitude of solutions available in the market today, how do you know which is going to be right for your organisation?


KPMG Australia buying IAM vendor First Point Global

24 March, 2015 by Dylan Bushell-Embling

KPMG Australia will purchase identity and access management vendor First Point Global as part of wider efforts by the KPMG global network to augment its global security capabilities.


Identity access management you can bank on

26 November, 2014

ING DIRECT, one of Australia's largest banks, has successfully rolled out an identity access management system that has dramatically improved turnaround times and efficiency, and decreased risks.


Nude photo leak shows that passwords are passé

29 September, 2014 by Dylan Bushell-Embling

Passwords are a flawed method of maintaining online security and should be replaced with identity management systems, Centrify Regional Manager Derek Morwood has argued.


Single sign-on: solving the password proliferation problem

08 September, 2014 by Stephen Withers

Having multiple passwords combined with numerous redundant sign-on processes poses both a security risk and a productivity loss for business. A single sign-on system is the answer.


Is a password manager right for you?

11 August, 2014 by Dylan Bushell-Embling

Organisations need to weigh up all the pros and cons of password managers to decide if they meet their needs, or whether SSO is a better option.


EU court backs "right to be forgotten"

21 May, 2014 by Dylan Bushell-Embling

Google has been ordered by an EU court to remove links to two pages a Spanish man would rather the internet "forgot", in a case that could have major implications for all online companies.


Ten tips for user password security

03 February, 2014 by David Attard*

We keep on hearing of more and more password leaks, hacks, identities being stolen and loss of personal information. Help your users generate better passwords - and look after them better - with these tips.


Google's "privatised surveillance" breaks Dutch law

05 December, 2013 by Dylan Bushell-Embling

Dutch regulators have declared Google's practice of aggregating user data to be a breach of local law, in a case which could have wider implications for the firm in the EU and elsewhere.


Management of security risk in information technology

12 November, 2013

The white paper addresses the Monetary Authority of Singapore (MAS) internet banking and technology risk management guidelines. 


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd