November 10, 2016
An enterprising Australian hot dog enthusiast faces a massive fine after using a drone to collect a sausage from a barbecue at a Melbourne DIY store, and delivering it direct to his hot tub in the ...
March 02, 2016
Cloud access security brokers are dominating the cloud security conversation at this year's RSA Conference. Here's what vendors are saying about CASBs.
January 12, 2016
Researchers in Germany have found two OAuth vulnerabilities, which could allow attackers to break the authorization and authentication standard. And an expert said the fix must be made to the standard itself.
December 21, 2015
Illumio wins SearchNetworking's Network Innovation Award for its Adaptive Security Platform.
Authorization Get Started
Bring yourself up to speed with our introductory content
There's been a great deal of buzz around the Windows Server 2016 Hyper-V feature, VM shielding. But how exactly does VM shielding work, and what benefits does it bring? Continue Reading
XenMobile Mail Manager provides access control and remote management features for devices running Exchange ActiveSync or BlackBerry Enterprise Service. Continue Reading
Microsoft puts more granular control in the hands of administrators, with enhanced conditional access control in Windows Server 2016. Continue Reading
Evaluate Authorization Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
For businesses small and large, Autodesk PLM 360 is PLM software that provides a broad range of functions, enhanced by a custom-designed mobile experience. Continue Reading
There's been a lot of controversy around the DMCA, especially because of the Chrysler car hack. Here are the issues with it and how it affects security researchers. Continue Reading
The U.S. Department of Justice started using Enterprise Box for cloud-based data storage and collaboration. Should enterprises also consider this option? Expert Dan Sullivan explains. Continue Reading
Learn to apply best practices and optimize your operations.
The Role-Based Access Control model manages and evaluates permissions in Exchange Online. Admins can explore the model, create new permissions and customize roles. Continue Reading
Azure Resource Manager has a complete, but complex, set of role-based access controls that let admins create policies to manage who can access Azure cloud services. Continue Reading
Get started on a vulnerability risk assessment process to prevent hacks on data, applications and more. Take these steps to identify vulnerabilities and improve risk management. Continue Reading
Problem Solve Authorization Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Bring your own device is a common practice, and now bring your own network is on the scene -- whether IT likes it or not. Continue Reading
The increased use of cloud applications has caused a parallel increase in shadow data loss. Expert Dan Sullivan explains how to prevent the risk. Continue Reading
Network security expert Michele Chubirka shares her thoughts about June's OPM hack and what steps IT should take to fend off future attacks. Continue Reading