September 16, 2015
A new report details how attackers can fly under the radar by using stolen credentials in order to avoid breach detection and forgoing the use of malware in malicious activity.
August 13, 2015
Some speculate that SDN could prevent a network outage like the one that brought United Airlines to a screeching halt. Others, however, say the industry needs an SDN reality check.
July 24, 2015
Airbnb does it; Uber does it. What about your organization? Sangeet Paul Choudary lays out the fundamentals of the platform business model.
March 04, 2015
NoSQL database security has taken a backseat to performance in Hadoop-based security big data analytics systems, but that may soon change thanks to growing demand and maturing NoSQL security products.
Authorization Get Started
Bring yourself up to speed with our introductory content
Geofencing technology creates a virtual fence on employee devices, adding a crucial extra layer of security. But do privacy concerns negate the benefits of this feature? Expert Michael Cobb explains. Continue Reading
When it comes to mobile app security, can developers ever really learn from past mistakes? TheServerSide talks to software systems security expert Dan Cornell about the challenges mobile application developers face when securing mobile apps. Continue Reading
One simple install of the File System Security PowerShell Module can help manage NTFS permissions for user access to folders. Continue Reading
Evaluate Authorization Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
While traditional IT perimeter security worked well for decades, today's mobile cloud apps demand a different approach: identity federation. Continue Reading
Containers have introduced a new way for developers to produce code -- and more anxiety for administrators who need visibility for troubleshooting. Continue Reading
Enterprise-grade file sync-and-share products offer more comprehensive features than consumer-grade file sharing applications. Continue Reading
Learn to apply best practices and optimize your operations.
As companies move content to the cloud, they need to sort out how to secure access to that information. Continue Reading
While cloud storage may seem simple, there's a lot to consider to maximize ROI. Make sure security, metadata and management are top of mind. Continue Reading
Privileged users pose a growing threat to organizations. Expert Joseph Granneman looks at this insider threat and shares ways to mitigate it. Continue Reading
Problem Solve Authorization Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Network security expert Michele Chubirka shares her thoughts about June's OPM hack and what steps IT should take to fend off future attacks. Continue Reading
SAP licenses can be a huge expense, but there are ways for enterprises to reduce licensing costs and ensure a better ROI on SAP investments. Continue Reading
Radiant Logic's Dieter Schuller says companies trying to master attribute-based access control should start with a hybrid mode. Continue Reading