Identity Management

Features and articles that focus on the way that security leaders identify individuals in their enterprises and control their access to particular areas.


Florida Senate Approves Bill Banning Biometrics in Schools

April 13, 2014

A proposal seeking to prevent school systems from collecting students' biometric data has won the support of the Florida Senate.

Read More

De Blasio Pushes New ID Cards for NYC Residents

March 25, 2014

New York City Mayor Bill de Blasio has reiterated his plans to institute a municipal ID card for New Yorkers.

Read More

Adding Badges to Save Budgets in Local Governments

Badging several thousand employees in several hundred different facilities can prove to be very complex.
March 1, 2014

Like every public administration, managing ID/access badges in municipal security comes with significant challenges that include organizational changes, continually shifting economic factors, regulatory compliance and emerging technologies and best practices.

Read More

FAQ: How to Ensure a Smarter PIV Program

February 25, 2014
The common identification standard for all federal employees and contractors is the Personal Identity Verification (PIV) smart card, defined by the National Institute of Standards and Technology (NIST) in Federal Information Processing Standard (FIPS) 201.
Read More

Why Identity Is the New Firewall

February 10, 2014
The recognition of the need for homeland security, and the rapid growth of the security industry around that need, is based in part on recognition of the critical need to ensure that no individuals in a facility or campus ever have access to an area where they are not authorized to enter.
Read More

Closing the Intelligence Gap with Identity-Powered Security

February 10, 2014
While security investment has continued at a steady pace, so have devastating data breaches – and the future trends don’t look any better.
Read More

NYC Testing Pedestrian Traffic Analysis

February 5, 2014

New York City is testing a new application to analyze video streams of city streets to glean data about pedestrian traffic patterns. City planning officials say that data illustrating the flow of people can offer several advantages, from helping small businesses scout new locations to enabling the sanitation department to anticipate demand for trash pick-ups, the article reports.

Read More

Target Traces Security Breach to Stolen Vendor Credentials

January 30, 2014

An intruder stole a vendor's credentials that were used to access Target's system and cause its massive security breach last year.

Read More

Pennsylvania Voter ID Law Struck Down

January 17, 2014

A state court judge struck down a Pennsylvania law requiring that voters to show photo identification at the polls.

Read More

California Bill Would Restrict Selling and Access to License Plate Data

January 16, 2014

The California State Senate is considering a bill to prohibit law enforcement agencies in California from selling data collected by automatic license plate readers.

Read More


Public-Private Partnerships: Creating a Resilient Community


AVAILABLE ON DEMAND Our presenter will talk about hazard and threat analysis, integrated planning, the importance of your business’ continuity to the community and how your organization can help with restoration and recovery.

Read More



Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.


Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts


Security Magazine

April 2014

2014 April

In the April issue of Security magazine, read about integration partnerships and their growing success. The Boston Marathon bombing has changed the way integrators look at security for sporting events, see where they are one year after the tragic incident. Read about the 2014 RSA conference and this year's theme of "Threat Intelligence. Also, read about the latest products and news in the security industry.

Table Of Contents Subscribe

Background Checks

Who conducts background checks on new employees and contractors in your enterprise?
View Results Poll Archive


CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to


Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13