3 tips to prevent a patient information breach

Both medical professionals and patients today are vulnerable to data security breaches. But in the worst case scenarios, it is mishandling of patient data by those same medical professionals that can cause an

Published on: October 8th, 2015 Robert Cordray

Dell pitches identity & access management as answer to business complexity

LAS VEGAS – When users, partners and IT managers think of Dell and security, the SonicWall firewall product likely comes to mind. But the vendor is building a security portfolio that integrates all

Published on: August 31st, 2015 Jeff Jedras

VMware launches enterprise single sign-on solution

Palo Alto-based VMware Inc. is launching its own single sign-on solution for big companies looking to enable their workers to do their jobs completely from mobile devices, the firm announced on Monday evening.

Published on: June 15th, 2015 Brian Jackson

10 identity management metrics that matter

Within the IT security community, identity- and access-management (IAM) initiatives are considered high value, but are notoriously problematic to deploy. Yet despite IAM's complexity, it represents 30 per cent or more of the

Published on: October 5th, 2011 Frank Villavicencio

Enhanced driver’s license program a “threat” to privacy

Despite widespread privacy concerns, several Canadian provinces are pushing through with the implementation of the enhanced driver's license (EDL) scheme that seeks to link U.S.-Canada border security measures. In January, British Columbia became

Published on: August 12th, 2008 Nestor Arellano

Technology smarts save millions for LaFarge and The Gap

Cost cutting in information technology looms over many corporate IT groups now, in these tough economic times. We're here to help by profiling tactical projects you can execute in a few weeks to

Published on: August 1st, 2008 Kim Nash

Microsoft disputes CardSpace can be hacked despite paper outlining how it can be done

Microsoft is disputing that its CardSpace authentication management technology can be hacked despite a research paper that outlines a proof-of-concept attack.CardSpace manages personal information that might be needed to access certain Web sites

Published on: June 3rd, 2008 Jeremy Kirk

North Shore offers up identity management over wireless network

A boutique bank in B.C. is looking to differentiate itself by providing identity management over a wireless network to its 300 employees and 14,000 members.North Shore Credit Union is rolling out HP ProCurve

Published on: May 14th, 2007 Vawn Himmelsbach

ID management experts tackle user resistance challenges

A panel of experts told an audience of IT managers in early March that the best way to get users involved in access and identity management is to allow them to participate more

Published on: March 22nd, 2006 Neil Sutton

Bridgepoint prescribes portal for access

If users have to remember more than three passwords, they often start writing them down, according to Novell Canada's chief technology and chief information officer, Ross Chevalier.At Bridgepoint Health, a typical user had

Published on: March 21st, 2006 Poonam Khanna