By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Web authentication and access control News
May 12, 2017
A Slack vulnerability exposed user authentication tokens and enabled hackers to access private data. Expert Matthew Pascucci explains how and why this hack was successful.
April 07, 2017
CA Strong Authentication brings inexpensive multi- and two-factor authentication to businesses looking to protect mobile applications and devices and to prevent identity theft.
November 08, 2016
Researchers find widespread risk for users of apps with insecure OAuth implementation, which could lead to attackers being able to access the data held within a vulnerable app.
July 13, 2016
The wildly popular Pokémon GO mobile game obtained a full account access token to iOS users' Google accounts, revealing a major issue with Google's OAuth authentication system.
Web authentication and access control Get Started
Bring yourself up to speed with our introductory content
An identity and access management system is increasingly essential to corporate security, but technological advances have made managing an IAM more complex than ever. Continue Reading
Cloud IAM services are growing in popularity among enterprises, but it's not a simple implementation. Expert Matthew Pascucci explains what to know before using a cloud IAM service. Continue Reading
Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., name and password) to access multiple applications. Continue Reading
Evaluate Web authentication and access control Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Facebook's Delegated Recovery aims to replace knowledge-based authentication with third-party account verification. Expert Michael Cobb explains how this protocol works. Continue Reading
Okta Adaptive MFA offers businesses a range of flexible authentication methods that use different contexts to determine which factors provide users with access. Continue Reading
With authentication methods ranging from risk-based to tokens, RSA Authentication Manager gives companies a number of ways to employ multifactor authentication. Continue Reading
Manage Web authentication and access control
Learn to apply best practices and optimize your operations.
After enterprise identities are authenticated, an authorization management system should monitor how resources are being used. Expert Peter Sullivan explains how it can work. Continue Reading
Privileged user management is important for enterprises operating on the cloud. Expert Dave Shackleford discusses some best practices to help secure cloud access control. Continue Reading
Authentication vulnerabilities are a constant problem, but testing tools like hashcat can make a significant difference. Expert Joe Granneman discusses hashcat and password cracking. Continue Reading
Problem Solve Web authentication and access control Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Network administrators typically resist policies for separate accounts when performing different tasks. Expert Michael Cobb explains the risk of privileged access. Continue Reading
Mandatory access control and application sandboxing both offer layers of security through controlling access to system resources. Expert Michael Cobb explains what sets each apart. Continue Reading
Doling out too many admin privileges can lead enterprises astray when it comes to privileged identity management, but there are ways they can take back control. Continue Reading