Authentication & authorization News
May 20, 2016
Rule 41 changes face bipartisan opposition in Senate with the Wyden-Paul bill to rein in the expansion of authority to let the government hack unlimited numbers of devices with a single warrant.
February 19, 2016
Securing AWS starts with knowing what mistakes to avoid. So, to get off on the right foot, learn from these cautionary tales of common AWS security blunders.
January 20, 2016
New surveys from Kaseya and Clutch indicate continuing demand for managed services and suggest companies offering a wider range of services may see the highest growth.
August 14, 2015
There are a number of paths to enterprise mobility, and in many cases, EMM takes a backseat to apps.
Authentication & authorization Get Started
Bring yourself up to speed with our introductory content
We want to lock down data moving between EC2 instances and EBS volumes. What security and encryption options are available in Amazon Elastic Block Store? Continue Reading
Your organization needs to make decisions about its IAM strategy in order to keep up with the new technologies its deploying. Steps to take begin at the policy level. Continue Reading
The amount of enterprise unstructured content is growing every year. Expert Sean Martin explains why IAM is an important component of unstructured data management and security. Continue Reading
Evaluate Authentication & authorization Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Citrix's relationship with Microsoft grew closer at Synergy 2016 -- which is no surprise given that CEO Kirill Tatarinov used to work there -- but it also touted several other product updates and strategic alliances. Continue Reading
This Security School examines how security professionals should consider updating and adapting their IAM framework to work with emerging technologies. Continue Reading
Your IAM infrastructure should cut through the 'access excess' that is plaguing most companies. Learn how to overcome the challenges posed by migration to cloud and mobility. Continue Reading
Manage Authentication & authorization
Learn to apply best practices and optimize your operations.
From compliance to encryption, there are many boxes an organization needs check to ensure its public cloud is secure. Use this flow chart to kick start that critical process. Continue Reading
Software technology has impacted nearly everyone everywhere with the intention of improving lifestyles. However, when crucial security steps aren't being met, these technologies can take a catastrophic turn. To avoid hacking and other security missteps, it's essential to plan early and carefully.
This handbook looks at various secure testing strategies to ensure software safety now. In the first article, Gerie Owen covers the basic security measures to avoid getting hacked and advocates the importance of thinking like a hacker. In part two, Valerie Silverthorne views security from an Agile development perspective and examines how to reduce software vulnerabilities. Finally, Amy Reichert-Browerstock closes out the handbook with website penetration testing techniques for a regular testing cycle and how to check for security defects at the start of a test cycle. Guarantee protected software with these security actions.Continue Reading
One way to achieve software-defined network security is to implement a no-touch approach to networking administration. Learn how it can be done, and what needs to change before it’s possible. Continue Reading
Problem Solve Authentication & authorization Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A new generation of workers has brought mobile privacy to the forefront of security conversations. Organizations need to create privacy policies now or risk losing out on valuable employees. Continue Reading
Before utilizing cloud database services, there are several security considerations to keep in mind and prepare for. Expert Dan Sullivan explains. Continue Reading
A report from Adallom highlights the lack of SaaS security in enterprises, but expert Dave Shackleford has ways to take back the cloud and lessen the risks, such as enhanced cloud app security. Continue Reading