March 22, 2017
In this episode of SearchSecurity's Risk & Repeat podcast, editors discuss the indictments of the alleged Yahoo hackers and how the attackers minted Yahoo authentication cookies.
January 10, 2017
Telstra's implementation of Kony wins a Modern Mobility Innovation Award because it relied on user feedback to build a productivity-boosting HR mobile app.
December 07, 2016
The final cybersecurity report from the Obama administration covered issues, including authentication, identity, infrastructure, cyberthreats and cooperation, but experts disagree on the key points.
October 06, 2016
Organizations that want to simplify device management and access are interested in workspace suites, such as VMware Workspace One.
Authentication Get Started
Bring yourself up to speed with our introductory content
Massive IoT, one of the main application segments for 5G identified by standard body 3GPP, requires strong security to defend against targeted attacks. Continue Reading
ID management and authentication help IT answer the burning questions of who is accessing the company network, when, where and on what device. Continue Reading
In Windows 10, users can change their authentication method, tweak the Start menu, choose their default save locations and more. Here's how. Continue Reading
Evaluate Authentication Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert Karen Scarfone takes a look at the OpenVPN Access Server SSL VPN for securing network traffic by providing encrypted tunnels to the enterprise. Continue Reading
Researchers identified 110 malicious Tor HSDirs that were found snooping information. Expert Kevin Beaver discusses the takeaways from this research for enterprises. Continue Reading
A digital signature on an HTML5 document cannot be authenticated the same way a PDF can. Expert Michael Cobb explains how enterprises should address this issue. Continue Reading
Learn to apply best practices and optimize your operations.
Companies can expect data threats to proliferate in 2017. To help, security experts outline resolutions organizations should make to bolster their cybersecurity strategies. Continue Reading
Enterprises are constantly bombarded by mobile security threats, and it's up to IT pros to thwart them. There are six key items that belong on IT's mobile security checklist. Continue Reading
Network administrators must increasingly contend with the challenges fueled by gadget security within their operations. Continue Reading
Problem Solve Authentication Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
While news of wearable hacks is making headlines, don't tear the device off your wrist just yet. Let's assess the likelihood of an attack on authentication sensor data. Continue Reading
CloudFanta is a new kind of malware threatening enterprises. Expert Rob Shapland explains how it leverages cloud storage site SugarSync to infect users and enterprises. Continue Reading
Users require access to virtual resources on their mobile devices. IT can manage VDI on smartphones and tablets using authentication methods, individual virtual app delivery and more. Continue Reading