Biometrics

biometrics

An Introduction to Biometrics for Identity Management

In this article, we provide an overview of Biometrics and how they can be used to manage identity.  At the beginning of 2020, Cybersecurity pundits have already made their predictions about what the threat landscape will look like this year. While some have predicted gloom and doom scenarios, others believe that it will be the […]

An Introduction to Biometrics for Identity Management Read More »

cybersecurity articles

7 Must-Read IDM & Cybersecurity Articles, January 2019

Thanks for reading the biweekly Idenhaus Identity Management & Cybersecurity digest. We curate a diverse selection of access management, RBAC, & cybersecurity articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here. This week’s news digest includes 7 informative and insightful IAM and cybersecurity articles from late December 2018 and early January 2019. Enjoy!

7 Must-Read IDM & Cybersecurity Articles, January 2019 Read More »

9 Identity Management & Cybersecurity Articles for IT Pros

Security weaknesses in the US critical infrastructure, POS and supply chain systems, and biometric facial recognition headline the Idenhaus Identity Management and Cybersecurity digest for August 23, 2016. If you would prefer to receive a short digest, please subscribe to the Idenhaus Identity Management & Cybersecurity biweekly here. Here are the top 9 Identity Management

9 Identity Management & Cybersecurity Articles for IT Pros Read More »

Top 10 Identity Management & Cybersecurity Articles, August 2016

Every two weeks we curate the top Identity Management and Cybersecurity articles from around the industry. Today’s digest covers topics from OT/IT collaboration to DDoS and ransomware to biometrics and digital identity. Check out these 10 must-read IAM and cybersecurity articles from early August 2016. If you would prefer to receive an even shorter digest, please subscribe

Top 10 Identity Management & Cybersecurity Articles, August 2016 Read More »

7 Must-Read Identity Management & Cybersecurity Articles, May 2016

Watch a US Power Grid get hacked, learn how Troy Hunt verifies data “breaches”, and check out Anton Chuvakin’s new “Understanding Insider Threats” paper in this week’s Identity Management and Cybersecurity digest. Get this biweekly update delivered a day earlier by signing up for our newsletter.   6 privacy landmines and how to avoid stepping

7 Must-Read Identity Management & Cybersecurity Articles, May 2016 Read More »

Scroll to Top