Password authentication News
January 27, 2016
The MSPAlliance has enhanced its decade-old MSP/Cloud Verify certification program to address such issues as software licensing, password management and cybersecurity.
January 15, 2016
December 08, 2015
A new report showed that while retail companies are confident in their security, many use bad access-management practices with temporary workers brought in for the holiday season.
October 22, 2015
Data loss prevention, multifactor authentication and document sharing all get a security boost in Office 2016, but you might want to consider holding off on upgrading.
Password authentication Get Started
Bring yourself up to speed with our introductory content
This backup and recovery tutorial, excerpted from the book 'Implementing SAP Business Suite on SAP HANA' by Michael Pytel, walks you through backup and recovery scenarios. Continue Reading
Biometric authentication has quickly evolved to include behavioral identifiers. Expert Michael Cobb explores the benefits of behavioral biometric technology for enterprises. Continue Reading
How does Amazon's Simple AD differ from Microsoft's Active Directory, and what security issues should be considered before creating a Simple AD? Expert Dan Sullivan explains. Continue Reading
Evaluate Password authentication Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
By using the single-sign on product installed at their workplace, healthcare professionals can quickly log on to multiple applications without much hassle. Continue Reading
MasterCard is testing a new facial recognition authentication system for mobile payments. Expert Michael Cobb explains how it works, and what it means for users. Continue Reading
Some endpoint security suites have reached a level where they create almost all the capabilities of an enterprise in microcosm. New emphasis has been placed on protections that don't depend on traditional static scanning, but how well are these various approaches (whitelisting, sandboxing and so on) working out? And could the cloud possibly be the best endpoint security solution in today's mobile age? This handbook looks at the current state of endpoint protection and offers tips on how to best ensure endpoint security in the future.
SearchSecurity contributors examine the question of how best to secure endpoints, and provide actionable advice. Karen Scarfone questions the all-too-common assumption that using the cloud undermines security, and also outlines specific ways in which cloud-based tools can be useful in improving endpoint security. In a separate chapter, Scarfone considers whether the best endpoint security is achieved by combining tools and methods -- that is, by using an endpoint security suite. Ed Tittel focuses on the threat to endpoint security from malware and how antimalware tools can beef up defenses, offering scenarios that show how antimalware products work to secure endpoints. Continue Reading
Manage Password authentication
Learn to apply best practices and optimize your operations.
In this excerpt of Building an Information Security Awareness Program, authors Bill Gardner and Valerie Thomas discuss why lecturing is an ineffective method of security awareness programs and offer alternative measures enterprises should consider. Continue Reading
Managing public/private keys is crucial for enterprises to ensure secure cloud authentication. Here are four tips to harden security of cloud keys. Continue Reading
With AirWatch by VMware, IT can manage Office365 applications on users’ mobile devices – all the while making sure those apps are secure. Continue Reading
Problem Solve Password authentication Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
If I want to share files between three client machines and a Windows server, what are my options? Continue Reading
Microsoft's Wi-Fi Sense for Windows 10 can share encrypted passwords for Wi-Fi networks, but is it safe? Expert Michael Cobb has the answer. Continue Reading
Several security vendors and providers have been hacked over the last year. Expert Michael Cobb explains how enterprises should prepare for a vendor hack. Continue Reading