Web Authentication and Access Control News
October 30, 2015
Google demands Certificate Transparency for all Symantec-issued certificates in wake of last month's escalating disclosures about fake "testing" certificates.
September 16, 2015
A new report details how attackers can fly under the radar by using stolen credentials in order to avoid breach detection and forgoing the use of malware in malicious activity.
June 11, 2015
Agencies from U.S. and U.K. governments now support the FIDO Alliance and its open standards for passwordless authentication.
March 25, 2015
Google, Microsoft, and Mozilla have revoked unauthorized TLS certificates issued by an intermediate certificate authority that could have been used in man-in-the-middle attacks.
Web Authentication and Access Control Get Started
Bring yourself up to speed with our introductory content
Bimodal identity and access management (IAM) uses two forms of credentials, internal and external, as a method of authentication. Continue Reading
Using passwords to authenticate users has a long and troubled past. Expert Rob Shapland explains how open standards such as FIDO, SAML and OpenID can help solve the woes surrounding user authentication in the cloud. Continue Reading
Bimodal IAM may be a new term, but this new way to use user credentials should probably already be in practice among secure organizations. Continue Reading
Evaluate Web Authentication and Access Control Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Learn about the new and improved security features in the upcoming Microsoft Edge browser, including on-by-default sandboxes, Passport and HTML5. Continue Reading
Cloud credentials can create major vulnerabilities. Expert Dan Sullivan outlines how to detect compromised credentials and the best ways to prevent it. Continue Reading
Explore how Certificate Transparency can help resolve certificate and certificate authority issues plaguing enterprises today. Continue Reading
Manage Web Authentication and Access Control
Learn to apply best practices and optimize your operations.
Securing biometric information is a crucial step for enterprises to take, but what happens if the data is still compromised? Expert Randall Gamby discusses biometric data security. Continue Reading
Doling out too many admin privileges can lead enterprises astray when it comes to privileged identity management, but there are ways they can take back control. Continue Reading
The right security policies and technology can make or break an enterprise's identity and access management process. Learn why AWS IAM is crucial when protecting corporate data. Continue Reading
Problem Solve Web Authentication and Access Control Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
While using the cloud for identity and access management can simplify the task, it is critical to consider a number of factors when implementing cloud IAM products and services. Expert Dave Shackleford explains. Continue Reading
The recent Django authentication flaw highlights the importance of testing for authentication vulnerabilities. Michele Chubirka explains how. Continue Reading
Michael Cobb explores the pros and cons of authentication caching and whether the practice can truly calm network strain. Continue Reading