Authentication & authorization News
January 27, 2017
In part two of his interview with SearchSecurity, SSH creator Tatu Ylonen explains why proper SSH key management is crucial and how attackers can use lost or exposed keys.
December 12, 2016
Executives from One Identity, which operates under Quest Software, discuss the company's renewed focus on the channel.
November 22, 2016
Executive coach Michelle Lederman schooled the audience at SIMposium 2016 on the three leadership tenets of the relationship-driven executive.
November 21, 2016
UK-based identity and access management (IAM) vendor ProofID has revamped and renamed it ARMS product. Now called ProofID IGA (Identity Governance and Admin) its prime use case is to aid the ...
Authentication & authorization Get Started
Bring yourself up to speed with our introductory content
If you would like to rely on a wearable as a source of identity verification, there are some key things to keep in mind. Continue Reading
Tailgating, sometimes referred to as piggybacking, is a physical security breach in which an unauthorized person follows an authorized individual to enter a secured premise. Continue Reading
The rush to embrace digital technologies can put organizations at extreme risk. Here are six foundations for creating an information-security strategy that will keep your data safe. Continue Reading
Evaluate Authentication & authorization Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
A new tool called AWS Organizations aims to make cloud account management more secure. Expert Matthew Pascucci explains how the tool works and how it compares to AWS IAM. Continue Reading
With all the new updates and features, Windows 10 can appear daunting. To simplify the transition, break down and tailor the permissions in Windows 10 to users' specific needs. Continue Reading
Companies have a lot at stake with IoT. A myriad of tools are emerging that provide the security features necessary to ensure connected enterprises don't get hacked. Continue Reading
Manage Authentication & authorization
Learn to apply best practices and optimize your operations.
Ever since the internet of things became a "thing," the potential for abuse has been well documented; how best to achieve security for IoT is not yet clear. This Insider Edition of Information Security magazine tackles that second issue head on.
In three feature stories, our experts examine the key aspects closely related to IoT security: device discovery, IoT identity and IoT security testing. It's basic to security that, to devise a proper security strategy, a security team must possess an accurate record of what exactly needs to be secured. The challenge when it comes to security for IoT is in cataloging, assessing and classifying devices that can number into the thousands and are often located outside an enterprise's physical boundaries. Certain industries, such as healthcare, are well into tackling this challenge. But increasingly more companies of all sizes will have to give the issue careful attention. Discovery involves identity issues, another focus of this edition, and once a security team has refined their IoT security policy, the next logical step is to implement a process of IoT security testing.
Readers of this Insider Edition will come away with a deeper understanding of how to approach security for IoT, from how to create a compilation of what needs to be secured to how to set up a successful security testing process. When it comes to internet of things security, the threat of breaches may never be fully eliminated, but the odds that enterprises will thwart attacks can be improved through proper policy and security systems.Continue Reading
To increase security and monitor user access to public cloud resources such as compute and APIs, admins can use federated identity and access management. Continue Reading
BYOD disrupted how the IT department managed resources. Now, administrators face a management challenge presented by a new interloper -- Microsoft accounts. Continue Reading
Problem Solve Authentication & authorization Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
From compliance to encryption, there are many boxes an organization needs check to ensure its public cloud is secure. Use this flow chart to kick start that critical process. Continue Reading
The amount of enterprise unstructured content is growing every year. Expert Sean Martin explains why IAM is an important component of unstructured data management and security. Continue Reading
A new generation of workers has brought mobile privacy to the forefront of security conversations. Organizations need to create privacy policies now or risk losing out on valuable employees. Continue Reading