Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » identity (ID) management

Articles Tagged with ''identity (ID) management''

Jeff Reich podcast news header

Navigating the identity security landscape

Listen to Jeff Reich, Executive Director of the Identity Defined Security Alliance, in this podcast episode.
Security Staff
March 27, 2024

Jeff Reich, Executive Director of the Identity Defined Security Alliance, discusses the challenges security professionals face in the evolving landscape of identity security threats.



Read More
open laptop saying 'join us online'

Identity-based incidents accounted for 64% of all incidents

Security Staff
January 23, 2024

According to a threat report by Expel, identity-based incidents accounted for 64% of all investigated, a volume increase of 144% from 2022 to 2023.


Read More
airplane taking off

New York airport adds credential authentication scanners

Security Staff
December 4, 2023

TSA announced that Albany and Syracuse Hancock International Airports are adding credential authentication technology to security checkpoints.


Read More
lock over blue digital graphics

The road ahead for identity management

Martin Kuhlmann
November 10, 2023

As cyber attacks continue and layoffs and economic uncertainty remains, the greater the need for strong, modern identity management and governance.


Read More
computer desk with keyboard and speaker

48% of CISOs claim AI security is their biggest concern

Security Staff
September 7, 2023

Despite being in a period of economic slowdown, 56% of CISO survey respondents reported an increase in their cybersecurity budget from 2022.


Read More
person paying online with credit card

Authenticating like the transportation security administration

Paul Trulove
September 6, 2023

Identity authentication used by the Transportation Security Administration and financial institutions can be implemented in other areas of security.


Read More
green and pink pyramid on blue background

94% of organizations don't have full visibility into service accounts

Security Staff
September 6, 2023

Identity security was analyzed in a report by Silverfort finding the identity attack surface as the most significant gap in cybersecurity resilience.


Read More
keyboard with blue underlighting

41% of organizations said they can enforce consistent access policies

Security Staff
August 21, 2023

According to a recent Strata Identity report, 60% of organizations do not have the resources or time to rewrite old, outdated applications.


Read More
plane on runway

TSA prepares for Fourth of July travel increase

Security Staff
June 30, 2023

As people plan to travel for Independence Day, TSA highlighted some of its screening technology to inform the high-volume of travelers.


Read More
Laptop screen

Survey shows disconnect in cloud security perception vs. readiness

Security Staff
June 23, 2023

While many security professionals leverage high-risk practices and behaviors in their cloud environments, they are confident security tools will protect against attacks. 


Read More
Previous 1 2 3 4 5 6 7 8 9 … 24 25 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing