WhatIs definition: BYOI (bring your own identity)

Web Authentication and Access Control

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • How to detect rogue DHCP servers, routers and NICs on a network

    In this Ask the Expert Q&A, our identity and access management expert identifiies techniques and tools that help detect rogue DHCP servers, routers and network interface cards on a network. 

  • Mapping Windows client certificates

    In this Ask the Expert Q&A, Michael Cobb explains how to properly map Windows client certificates to access a Web site. 

  • Researcher: Oracle failed to patch critical flaw

    Attackers could exploit a critical flaw in the Oracle PLSQL Gateway, a researcher warns, saying users have been vulnerable for months, but Oracle sees it differently. 

  • Secure data transmission methods

    The main purpose of this tip is to explore secure data transmission options that are available to help meet regulatory and legal requirements. 

  • Complying with SOX 404

    Learn how SOX compliance regulations can affect log on policies and procedures, and how a thorough risk analysis can help administrators keep their default accounts. 

  • IP cloaking becoming a business necessity

    Just by browsing your competitor's Web site, you might be giving away your company's most guarded secrets. Experts offer advice for countering the subterfuge and keeping secrets safe. 

  • Be afraid of the catastrophic data breach

    Though stories on the latest data breaches seem to pass through the headlines in the blink of an eye, experts warn that the loss or exposure of customer data can have long-lasting consequences. In fact, just one such incident can bring an enterprise ... 

  • How to protect a LAN from unauthorized access

    In this Ask the Expert Q&A, web access control guru Joel Dubin outlines steps to take to protect a LAN. 

  • Layered access control: 6 top defenses that work

    Security guru Joel Snyder introduces six strategies for building layered security in networks in this presentation from Information Security Decisions. 

  • How to secure session tokens

    Dos and don'ts for protecting session IDs for users of e-commerce Web sites.