January 10, 2017
Telstra's implementation of Kony wins a Modern Mobility Innovation Award because it relied on user feedback to build a productivity-boosting HR mobile app.
December 07, 2016
The final cybersecurity report from the Obama administration covered issues, including authentication, identity, infrastructure, cyberthreats and cooperation, but experts disagree on the key points.
October 06, 2016
Organizations that want to simplify device management and access are interested in workspace suites, such as VMware Workspace One.
September 30, 2016
In part two of his interview with SearchSecurity, MobileIron's James Plouffe talks about his role as a technical consultant on 'Mr. Robot' and how the show achieves its authenticity.
Authentication Get Started
Bring yourself up to speed with our introductory content
Massive IoT, one of the main application segments for 5G identified by standard body 3GPP, requires strong security to defend against targeted attacks. Continue Reading
ID management and authentication help IT answer the burning questions of who is accessing the company network, when, where and on what device. Continue Reading
In Windows 10, users can change their authentication method, tweak the Start menu, choose their default save locations and more. Here's how. Continue Reading
Evaluate Authentication Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Researchers identified 110 malicious Tor HSDirs that were found snooping information. Expert Kevin Beaver discusses the takeaways from this research for enterprises. Continue Reading
A digital signature on an HTML5 document cannot be authenticated the same way a PDF can. Expert Michael Cobb explains how enterprises should address this issue. Continue Reading
The Microsoft Office 365 SAML flaw that allowed attackers to bypass authentication was resolved quickly, but offers enterprises some important lessons. Expert Ed Moyle discusses. Continue Reading
Learn to apply best practices and optimize your operations.
Enterprises are constantly bombarded by mobile security threats, and it's up to IT pros to thwart them. There are six key items that belong on IT's mobile security checklist. Continue Reading
Network administrators must increasingly contend with the challenges fueled by gadget security within their operations. Continue Reading
Authentication vulnerabilities are a constant problem, but testing tools like hashcat can make a significant difference. Expert Joe Granneman discusses hashcat and password cracking. Continue Reading
Problem Solve Authentication Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Users require access to virtual resources on their mobile devices. IT can manage VDI on smartphones and tablets using authentication methods, individual virtual app delivery and more. Continue Reading
Network administrators typically resist policies for separate accounts when performing different tasks. Expert Michael Cobb explains the risk of privileged access. Continue Reading
An Android Trojan called SlemBunk is impersonating banking applications in order to collect user credentials. Expert Nick Lewis explains the security measures to stop this malware. Continue Reading