Security > Identity management

Ten tips for user password security

03 February, 2014 by David Attard*

We keep on hearing of more and more password leaks, hacks, identities being stolen and loss of personal information. Help your users generate better passwords - and look after them better - with these tips.


Google's "privatised surveillance" breaks Dutch law

05 December, 2013 by Dylan Bushell-Embling

Dutch regulators have declared Google's practice of aggregating user data to be a breach of local law, in a case which could have wider implications for the firm in the EU and elsewhere.


Management of security risk in information technology

12 November, 2013

The white paper addresses the Monetary Authority of Singapore (MAS) internet banking and technology risk management guidelines. 


A password you can swallow? Don’t hold your breath

28 June, 2013 by James H Hamlyn-Harris, Swinburne University of Technology

If you believe the hype, a ‘password pill’ could save you from remembering passwords. But don’t hold your breath for this technology - better alternatives are already available.


Verizon enhancing Enterprise Identity Services

23 September, 2011 by

Verizon is enhancing its cloud-based Enterprise Identity Services to offer more ways to authenticate users to corporate networks.


RSA Token one-to-one swap offer for CA ArcotID Secure Software Credential

07 April, 2011 by

Following a hacking attack on RSA Security, which may have compromised the integrity of RSA’s SecureID two-factor authentication tokens, CA Technologies is offering all RSA SecurID token customers an opportunity to trade their RSA tokens for CA ArcotID secure software credentials in a one-for-one swap.


Social media demands a review of your security framework

28 July, 2010 by Rob Forsyth*

The time lapse between the beginning of publicly available internet and what we now refer to as Web 2.0 was short. A relative nanosecond in terms of history. Rob Forsyth jumps forward from the history of the internet to social media and advocates that organisations need to embrace security to enable as much access to technologies as possible under a robust security framework.


Directory management

22 April, 2009 by

Access Manager 3.1 offers built-in support for WS-federation, a single sign-on feature.


Vein ID technology coming to an Aussie ATM near you

28 January, 2009

Finger vein authentication technology, developed by Hitachi following several years of R&D, uses the vein patterns of one's fingers to verify individual identity.


  • All content Copyright © 2025 Westwick-Farrow Pty Ltd