September 16, 2015
A new report details how attackers can fly under the radar by using stolen credentials in order to avoid breach detection and forgoing the use of malware in malicious activity.
August 13, 2015
Some speculate that SDN could prevent a network outage like the one that brought United Airlines to a screeching halt. Others, however, say the industry needs an SDN reality check.
July 24, 2015
Airbnb does it; Uber does it. What about your organization? Sangeet Paul Choudary lays out the fundamentals of the platform business model.
March 04, 2015
NoSQL database security has taken a backseat to performance in Hadoop-based security big data analytics systems, but that may soon change thanks to growing demand and maturing NoSQL security products.
Authorization Get Started
Bring yourself up to speed with our introductory content
Microsoft puts more granular control in the hands of administrators, with enhanced conditional access control in Windows Server 2016. Continue Reading
Geofencing technology creates a virtual fence on employee devices, adding a crucial extra layer of security. But do privacy concerns negate the benefits of this feature? Expert Michael Cobb explains. Continue Reading
When it comes to mobile app security, can developers ever really learn from past mistakes? TheServerSide talks to software systems security expert Dan Cornell about the challenges mobile application developers face when securing mobile apps. Continue Reading
Evaluate Authorization Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The U.S. Department of Justice started using Enterprise Box for cloud-based data storage and collaboration. Should enterprises also consider this option? Expert Dan Sullivan explains. Continue Reading
Expert Ed Tittel takes a look at Vormetric Transparent Encryption, a component of Vormetric's Data Security Platform that encrypts data and does access control for that data. Continue Reading
AWS administrators can establish encryption keys and user and S3 policies to protect unwanted access to cloud resources. Continue Reading
Learn to apply best practices and optimize your operations.
As companies move content to the cloud, they need to sort out how to secure access to that information. Continue Reading
One simple install of the File System Security PowerShell Module can help manage NTFS permissions for user access to folders. Continue Reading
While cloud storage may seem simple, there's a lot to consider to maximize ROI. Make sure security, metadata and management are top of mind. Continue Reading
Problem Solve Authorization Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The increased use of cloud applications has caused a parallel increase in shadow data loss. Expert Dan Sullivan explains how to prevent the risk. Continue Reading
Network security expert Michele Chubirka shares her thoughts about June's OPM hack and what steps IT should take to fend off future attacks. Continue Reading
SAP licenses can be a huge expense, but there are ways for enterprises to reduce licensing costs and ensure a better ROI on SAP investments. Continue Reading