New & Notable
Web Authentication and Access Control News
August 08, 2014
News roundup: When a breach occurs, it's common practice to share the information with victims -- both the users and the companies involved. However, Hold Security's billion-password hack disclosure hasn't followed standard procedure.
June 05, 2014
Despite the popularity of SAML, the mobile and cloud benefits of OpenID Connect may spur adoption as an enterprise authentication platform.
December 15, 2011
Following a breach to a GlobalSign Web server, an extensive investigation found no evidence of an infiltration of its digital certificate infrastructure and no leakage of its certificate keys.
June 07, 2011
Following a retooling of its manufacturing and supply chain management processes, RSA plans to replace security tokens for high risk customers.
Web Authentication and Access Control Get Started
Bring yourself up to speed with our introductory content
Here's everything you need to know to ensure secure IAM, no matter how complex your network environment. Continue Reading
Social login is a single sign-on (SSO) that allows users to authenticate themselves on various applications and sites by connecting through a social networking site rather than typing a separate ID and password on each website. The sites most ... Continue Reading
Multifactor authentication (MFA) is a security system that requires more than one form of authentication to verify the legitimacy of a transaction. MFA combines two or more independent credentials: what the user knows (password), what the user has (... Continue Reading
Evaluate Web Authentication and Access Control Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Michael Cobb explores the pros and cons of authentication caching and whether the practice can truly calm network strain. Continue Reading
Threats expert Nick Lewis explores whether Google's Transparency Report can be used to enhance blacklisting of malicious websites in the enterprise. Continue Reading
Explore the differences between consumer and enterprise password management products and learn pros and cons about the latest tools. Continue Reading
Manage Web Authentication and Access Control
Learn to apply best practices and optimize your operations.
How can we best prevent hacking and user account lock out in Web applications with forms-based authentication? Continue Reading
The recent Django authentication flaw highlights the importance of testing for authentication vulnerabilities. Michele Chubirka explains how. Continue Reading
Errors are bound to occur when SSL certificate management is handled manually. Learn how to avoid these common mistakes. Continue Reading
Problem Solve Web Authentication and Access Control Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Malware leveraging PKI and digital signatures is increasingly common. Nick Lewis explains the threat and five key defense strategies. Continue Reading
Enterprise use of adaptive authentication is growing internally and for Web applications. Brad Causey details the allure of risk-based authentication. Continue Reading
Leading browsers are required to use 2,048-bit length keys by the end of the year, but what effect does this have on security? Continue Reading