Web Authentication and Access Control News
October 30, 2015
Google demands Certificate Transparency for all Symantec-issued certificates in wake of last month's escalating disclosures about fake "testing" certificates.
September 16, 2015
A new report details how attackers can fly under the radar by using stolen credentials in order to avoid breach detection and forgoing the use of malware in malicious activity.
June 11, 2015
Agencies from U.S. and U.K. governments now support the FIDO Alliance and its open standards for passwordless authentication.
March 25, 2015
Google, Microsoft, and Mozilla have revoked unauthorized TLS certificates issued by an intermediate certificate authority that could have been used in man-in-the-middle attacks.
Web Authentication and Access Control Get Started
Bring yourself up to speed with our introductory content
Biometric authentication has quickly evolved to include behavioral identifiers. Expert Michael Cobb explores the benefits of behavioral biometric technology for enterprises. Continue Reading
Endpoint authentication is a security mechanism designed to ensure that only authorized devices can connect to a given network, site or service. Continue Reading
Bimodal identity and access management (IAM) uses two forms of credentials, internal and external, as a method of authentication. Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate Web Authentication and Access Control Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Using passwords to authenticate users has a long and troubled past. Expert Rob Shapland explains how open standards such as FIDO, SAML and OpenID can help solve the woes surrounding user authentication in the cloud. Continue Reading
Learn about the new and improved security features in the upcoming Microsoft Edge browser, including on-by-default sandboxes, Passport and HTML5. Continue Reading
Cloud credentials can create major vulnerabilities. Expert Dan Sullivan outlines how to detect compromised credentials and the best ways to prevent it. Continue Reading
Manage Web Authentication and Access Control
Learn to apply best practices and optimize your operations.
Too many privileged accounts can result in access abuse in enterprises. Expert Mike O. Villegas discusses which account privileges should be limited to reduce security incidents. Continue Reading
BYOK encryption services are a new trend among enterprises, despite all the challenges and risks that accompany them. Expert Dave Shackleford explains the appeal of BYOK. Continue Reading
Securing biometric information is a crucial step for enterprises to take, but what happens if the data is still compromised? Expert Randall Gamby discusses biometric data security. Continue Reading
Problem Solve Web Authentication and Access Control Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Doling out too many admin privileges can lead enterprises astray when it comes to privileged identity management, but there are ways they can take back control. Continue Reading
While using the cloud for identity and access management can simplify the task, it is critical to consider a number of factors when implementing cloud IAM products and services. Expert Dave Shackleford explains. Continue Reading
The recent Django authentication flaw highlights the importance of testing for authentication vulnerabilities. Michele Chubirka explains how. Continue Reading