BYOD

Authorization News

  • February 03, 2017 03 Feb'17

    AV security - unwelcome guests and visual oversight?

    Just who and what have you got connected to the network? If it was just a matter of regular IT products and employees, that would be hard enough. Now all manner of smart devices and itinerant ...

  • November 10, 2016 10 Nov'16

    Hot tub drone machine lands Aussie in hot water

    An enterprising Australian hot dog enthusiast faces a massive fine after using a drone to collect a sausage from a barbecue at a Melbourne DIY store, and delivering it direct to his hot tub in the ...

  • March 02, 2016 02 Mar'16

    CASBs gaining momentum at RSA Conference 2016

    Cloud access security brokers are dominating the cloud security conversation at this year's RSA Conference. Here's what vendors are saying about CASBs.

  • January 12, 2016 12 Jan'16

    OAuth vulnerabilities must be fixed in the standard

    Researchers in Germany have found two OAuth vulnerabilities, which could allow attackers to break the authorization and authentication standard. And an expert said the fix must be made to the standard itself.

View All News

Authorization Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Authorization Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Authorization

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Authorization Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close