WhatIs definition: BYOI (bring your own identity)

Web Authentication and Access Control

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Kerberos: Authentication with some drawbacks

    Kerberos is one of the most-widely used authentication methods today, but experts explain that it comes with some weaknesses. 

  • Kerberos security evolves for B2B, mobile tech

    Kerberos is a dominant authentication protocol, embedded in Windows, Solaris and multiple Linux flavors. But with new threats and new technology, an upgrade is in order. 

  • Video: Changes ahead for MIT Kerberos Consortium

    MIT's Kerberos Consortium members discuss the evolution of Kerberos, changes ahead for the widly used authentication platform and the issues that threaten its future. 

  • Sun shifts strategy with GRC push

    Sun Microsystems is making a move into the governance, risk and compliance market, ramping up the competition against Oracle, IBM, CA and others. 

  • Hashing out stronger password authentication

    Stanford University researchers have created a browser extension to improve Web security and prevent phishing and other attacks. 

  • Who, or what, is reading your email?

    According to a new survey, fear of data leaks has caused many large companies to hire staff specifically to read and analyze outbound employee email. 

  • Black Hat 2007: More on the dangers of Ajax

    One of the presenters at this year's Black Hat USA 2007 conference in Las Vegas is Billy Hoffman, a researcher with SPI Dynamics. Hoffman made headlines at last year's conference with a series of presentations on application security, particularly th... 

  • Researchers expose Ajax programming dangers

    Two security engineers from SPI Dynamics comb resources on the Net to build an Ajax application from scratch; the final product is rife with problems. 

  • Web security gateways meet rising malware threats

    Web security gateways combine layered defense against the rising tide of Web-based malware with URL filtering and application control. 

  • Web applications tangle security researchers, attract attackers

    Web application security researchers are finding that some of their work could land them on the wrong side of the law. As a result, Web applications are more vulnerable to attack.