Password authentication News
April 13, 2016
MIT researchers' Wi-Fi people locator could benefit small businesses. The technology could lead to password-free Wi-Fi in cafes and better climate control systems in offices.
March 18, 2016
Creating a safer Internet has become a central topic of discussion at Fluent 2016. The Seif project is one attempt to improve Web security and deliver trusted infrastructure to the Web.
February 17, 2016
A court order has ruled that Apple needs to create an iPhone backdoor to unlock the device used by the gunman in the San Bernardino killings, but Tim Cook opposed the ruling.
January 27, 2016
The MSPAlliance has enhanced its decade-old MSP/Cloud Verify certification program to address such issues as software licensing, password management and cybersecurity.
Password authentication Get Started
Bring yourself up to speed with our introductory content
It's critical to apply security testing into your app, as cybersecurity affects everyone. Testing before production can help prevent attacks. Expert Gerie Owen explains further. Continue Reading
There are various types of single sign-on technology that can be applied in any professional environment, including within healthcare facilities, to help authenticate users without requiring them to remember a multitude of different password and login combinations.
In this Buyer's Essentials guide, health IT expert Rick Krohn explains the differences between federated single sign-on (SS0), enterprise SSO, Web SSO and other SSO approaches. Krohn details why SSO in healthcare facilities can change depending on if business is conducted with outside partners or within their own building. Krohn also lists some criteria to help organizations that are on the hunt for SSO technology. He writes that they should identify the problem they are trying to solve, evaluate the systems that will be involved with any SSO they purchase and assign as many internal resources as is appropriate to aid the organization during the SSO transition, all while staying patient in their search for the right product.Continue Reading
If your healthcare organization is ready to purchase single sign-on technology, consider the various types offered, and make sure to take a close look at federated SSO. Continue Reading
Evaluate Password authentication Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Explore what Windows bloggers are writing about across the Internet. Topics range from upgrading on a budget to recovering Windows passwords to the security upgrades of Windows Hello. Continue Reading
Does your healthcare organization understand the benefits of single sign-on products? Learn how healthcare professionals quickly log on to multiple applications without much hassle. Continue Reading
MasterCard is testing a new facial recognition authentication system for mobile payments. Expert Michael Cobb explains how it works, and what it means for users. Continue Reading
Manage Password authentication
Learn to apply best practices and optimize your operations.
In this excerpt of Securing VoIP: Keeping your VoIP Network Safe, author Regis (Bud) Bates outlines different approaches to VoIP security and offers best practices to ensure infrastructure security is intact. Continue Reading
In an age of heightened cybersecurity risks, companies still aren't spending enough to create a network security overview. Continue Reading
Self-encrypting drives can provide added security for enterprises, but they aren't without vulnerabilities. Expert Michael Cobb explains what you need to know. Continue Reading
Problem Solve Password authentication Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
In the TV show 30 Rock, comedy writer Liz Lemon writes a sketch that spawns the catchphrase, "That's a deal breaker, ladies!" The phrase refers to anything a partner might do that could ... Continue Reading
Millions of fingerprint records were exposed in the OPM breach. Expert Michael Cobb explains how attackers can abuse such biometric data and what enterprises can do about it. Continue Reading
If I want to share files between three client machines and a Windows server, what are my options? Continue Reading