Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » identity (ID) management

Articles Tagged with ''identity (ID) management''

Report Highlights Growth of Mass Notification Systems

June 21, 2016

A new report shows how mass notification technology has become mission-critical for a broad array of businesses, agencies and institutions.


Read More

Regulatory Scrutiny, Economic Conditions and Cyber Threats Rank as Top C-Suite Risks

March 22, 2016

More organizations are realizing that additional risk management sophistication is warranted given the fast pace in which complex risks are emerging, according to a new survey. 


Read More

Military Bases No Longer Accepting IDs from Five States

January 13, 2016

U.S. military installations are no longer allowing visitors to gain base access using official ID cards from five states -- Illinois, New Mexico, Missouri, Washington and Minnesota -- because those cards don’t comply with federal standards.


Read More

Identity Thieves' Methods and Demographics are Changing

January 1, 2016

As identity theft and fraud become major moneymakers for criminals, the profile of a typical identity thief is changing


Read More

State Dept. to Boost US Passport Security

November 23, 2015

In an effort to increase security of passports, the U.S. State Department said U.S. passport holders will no longer have the option to pay for additional page inserts.
 


Read More

Nuclear Labs in New Mexico May Require Passports for Entry

October 30, 2015

The Los Alamos National Laboratory may require U.S. passports for entry. 


Read More

Survey Reveals 84% Support Eliminating Passwords

September 1, 2015

A recent survey found that password-based authentication is no longer capable of meeting the demands of modern information security, and that 84% of respondents would support eliminating passwords all together.
 


Read More

New Technique Could Tell Age of a Fingerprint

August 13, 2015

A new technique created at the National Institute of Standards and Technology may provide information about when a person and their fingerprints were at a particular location.
 


Read More

Just How Versatile is RFID Technology?

zalud-2016-200px.jpg
Bill Zalud
August 1, 2015

Not surprisingly, radio frequency identification (RFID) and that technology’s “little sister” real-time location systems (RTLS) seem to be everywhere doing just about everything. Many times, solutions blend together security and operations at myriad enterprises, organizations and agencies. And, ironically, some of the most cutting edge applications are geographically far flung in areas where it makes business sense to leap-frog at times nonexistent legacy technologies.


Read More

Congress Passes Law Creating ID Card for Veterans

July 13, 2015

Congress has approved the creation of a veterans' identification card.


Read More
Previous 1 2 … 14 15 16 17 18 19 20 21 22 23 24 25 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing