Theft+applications

Showing results 1 to 4 of 4

January 29, 2004 by

Lock IT Down: Anatomy of an identity

We hear about identity theft a lot these days, but as CIOs we need to think about the issue from the point of view of the enterprise entrusted with the "identities" of our users and customers. CIOs need to know how to manage identities and securely facilitate relationships to business applications.

Newsletters

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.
See All

Most Popular