New & Notable
Web Authentication and Access Control News
September 08, 2014
Data from McAfee shows many organizations have yet to fully patch the Heartbleed vulnerability, and as many as 300,000 websites remain at risk.
August 08, 2014
News roundup: When a breach occurs, it's common practice to share the information with victims -- both the users and the companies involved. However, Hold Security's billion-password hack disclosure hasn't followed standard procedure.
June 05, 2014
Despite the popularity of SAML, the mobile and cloud benefits of OpenID Connect may spur adoption as an enterprise authentication platform.
December 15, 2011
Following a breach to a GlobalSign Web server, an extensive investigation found no evidence of an infiltration of its digital certificate infrastructure and no leakage of its certificate keys.
Web Authentication and Access Control Get Started
Bring yourself up to speed with our introductory content
Expert David Strom looks at multifactor authentication and how the security technology has evolved from key fobs to smartphones and mobile devices. Continue Reading
Here's everything you need to know to ensure secure IAM, no matter how complex your network environment. Continue Reading
Social login is a single sign-on (SSO) that allows users to authenticate themselves on various applications and sites by connecting through a social networking site rather than typing a separate ID and password on each website. The sites most ... Continue Reading
Evaluate Web Authentication and Access Control Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
While cloud-based identity and access management services offer numerous benefits to enterprises, there are also a number of drawbacks. Learn the risks and rewards of cloud IAM. Continue Reading
Michael Cobb explores the pros and cons of authentication caching and whether the practice can truly calm network strain. Continue Reading
Threats expert Nick Lewis explores whether Google's Transparency Report can be used to enhance blacklisting of malicious websites in the enterprise. Continue Reading
Manage Web Authentication and Access Control
Learn to apply best practices and optimize your operations.
While using the cloud for identity and access management can simplify the task, it is critical to consider a number of factors when implementing cloud IAM products and services. Expert Dave Shackleford explains. Continue Reading
This Security School covers need-to-know information about cloud-based identity and access management, including best practices as well as its pros and cons. Continue Reading
How can we best prevent hacking and user account lock out in Web applications with forms-based authentication? Continue Reading
Problem Solve Web Authentication and Access Control Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The recent Django authentication flaw highlights the importance of testing for authentication vulnerabilities. Michele Chubirka explains how. Continue Reading
Malware leveraging PKI and digital signatures is increasingly common. Nick Lewis explains the threat and five key defense strategies. Continue Reading
Enterprise use of adaptive authentication is growing internally and for Web applications. Brad Causey details the allure of risk-based authentication. Continue Reading