October 06, 2016
Organizations that want to simplify device management and access are interested in workspace suites, such as VMware Workspace One.
September 30, 2016
In part two of his interview with SearchSecurity, MobileIron's James Plouffe talks about his role as a technical consultant on 'Mr. Robot' and how the show achieves its authenticity.
August 31, 2016
Identity Manager provides user authentication and access control, both in the cloud and on-premises. VMware provided an overview of both models in a VMworld 2016 session.
July 22, 2016
Oracle patches its biggest batch yet of security fixes in this quarter's CPU cycle.
Authentication Get Started
Bring yourself up to speed with our introductory content
Massive IoT, one of the main application segments for 5G identified by standard body 3GPP, requires strong security to defend against targeted attacks. Continue Reading
ID management and authentication help IT answer the burning questions of who is accessing the company network, when, where and on what device. Continue Reading
In Windows 10, users can change their authentication method, tweak the Start menu, choose their default save locations and more. Here's how. Continue Reading
Evaluate Authentication Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The Microsoft Office 365 SAML flaw that allowed attackers to bypass authentication was resolved quickly, but offers enterprises some important lessons. Expert Ed Moyle discusses. Continue Reading
The GAO reported on SEC cybersecurity weaknesses, even though the SEC regulates cybersecurity. Expert Mike Chapple discusses the effects of this report. Continue Reading
The newest versions of Microsoft's Office productivity suite are an interesting departure from the Office of old. There are several versions and editions of Office, and each one offers something a little bit different. There's the well-known local desktop version, Office 2016, and the relative newcomer, cloud-based Office 365. The apps in each are comparable, but Office 365 offers more flexibility with its access-from-anywhere model.
Companies and IT administrators need to know what they're getting from the different Office editions -- and smaller shops are not exclusively limited to the Office for Business versions. Businesses must also consider whether to deliver the mobile or desktop version, and they might even find it's time to switch to the cloud-based subscription suite. One bright spot in this migration process is that Microsoft has added security features to Office 2016, so moving off an older version could improve existing security measures. This handbook outlines everything businesses need to know about choosing which Office to deliver to users.Continue Reading
Learn to apply best practices and optimize your operations.
Authentication vulnerabilities are a constant problem, but testing tools like hashcat can make a significant difference. Expert Joe Granneman discusses hashcat and password cracking. Continue Reading
Users require access to virtual resources on their mobile devices. IT can manage VDI on smartphones and tablets using authentication methods, individual virtual app delivery and more. Continue Reading
Network administrators typically resist policies for separate accounts when performing different tasks. Expert Michael Cobb explains the risk of privileged access. Continue Reading
Problem Solve Authentication Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
An Android Trojan called SlemBunk is impersonating banking applications in order to collect user credentials. Expert Nick Lewis explains the security measures to stop this malware. Continue Reading
As the hobbit Frodo Baggins leaves the familiar surroundings of his home in the Shire in the movie The Fellowship of the Ring, he remembers something his uncle Bilbo told him, "It's a dangerous ... Continue Reading
Employee collaboration habits have prompted new ways of working, and IT's role has changed in the process. Employees are embracing collaboration, remote working and bringing their own apps and ... Continue Reading