Enterprise identity and access management
Identity and access management tools are integral to maintaining data security in the enterprise. Here you'll find information on passwords, authentication and Web access control. Browse the identity management and access control topics below for the latest news, expert advice, learning tools and more.
Top Stories
-
News
28 Oct 2021
Twitter details internal Yubico security key rollout
Following last year's breach, Twitter obtained 100% security key enrollment from its 5,500 internal employee accounts within a month of the cutover date. Continue Reading
By- Alexander Culafi, Senior News Writer
-
News
26 Oct 2021
Researcher cracks 70% of neighborhood Wi-Fi passwords
A CyberArk researcher showed that $50 worth of hardware and some attack scripts are all you need to break into home and small business Wi-Fi networks. Continue Reading
-
Tip
01 Sep 2021
Blockchain for identity management: Implications to consider
Blockchain has changed the way IAM authenticates digital identities. Consider these 14 implications when asking how and where IAM can benefit your organization. Continue Reading
By- Jessica Groopman, Kaleido Insights
-
Definition
30 Jul 2021
Active Directory Domain Services (AD DS)
Active Directory Domain Services (AD DS) is a server role in Active Directory that allows admins to manage and store information about resources from a network, as well as application data, in a distributed database. Continue Reading
By- Ben Lutkevich, Site Editor
- Toni Boger, TechTarget
-
Tip
12 Jul 2021
How to implement machine identity management for security
In IAM, companies must consider whether machines, applications and devices have the appropriate identities and access authorizations when communicating behind the scenes. Continue Reading
By -
Tip
07 Jun 2021
Corral superuser access via SDP, privileged access management
Keeping control of superusers is an ongoing challenge. Employing SDP and privileged access management can make the job easier. But can SDP replace PAM? Continue Reading
By- John Burke, Nemertes Research
-
Tip
04 Jun 2021
5 steps to secure the hybrid workforce as offices reopen
Companies must now face the security challenges of overseeing a hybrid workforce as employees return to the office. Continue Reading
By- Ashwin Krishnan, StandOutin90Sec
-
Feature
21 May 2021
RSA Conference 2021: 3 hot cybersecurity trends explained
In a lightning round session at RSA Conference, ESG analysts discussed three of the hottest topics in cybersecurity in 2021: zero trust, XDR and SASE. Continue Reading
By- Sharon Shea, Executive Editor
-
Feature
07 May 2021
Despite confusion, zero-trust journey underway for many
Zero trust is a catchy phrase with seemingly lofty goals. Uncover the reality behind one of infosec's hottest buzzphrases, and learn why it's within reach for many companies today. Continue Reading
By- Sharon Shea, Executive Editor
-
News
26 Mar 2021
Jumio CEO discusses new $150 million funding round
Jumio CEO Robert Prigge talks about Jumio's new funding round and how the COVID-19 pandemic has affected Jumio's digital identity verification and fraud prevention business. Continue Reading
By -
Tip
26 Mar 2021
Stay in control with Azure AD Privileged Identity Management
Rampant use of elevated privileges can prove hazardous to enterprises. Rein in access and manage resource access with help from this Azure Active Directory feature. Continue Reading
By- Reda Chouffani, Biz Technology Solutions
-
Feature
17 Mar 2021
Top incident response tools to boost network protection
Incident response tools can help organizations identify, prevent and respond to malware exploits, ransomware and other targeted cybersecurity attacks. Continue Reading
By- Dave Shackleford, Voodoo Security
-
Tip
08 Feb 2021
7 privileged access management best practices
Privileged access is a given in enterprise environments, but it presents many security issues if breached. Follow these seven PAM best practices to mitigate risk. Continue Reading
By- Ashwin Krishnan, StandOutin90Sec
-
Tip
29 Jan 2021
Azure Information Protection P1 vs. P2: What's the difference?
Azure Information Protection adds security to files such as sensitive emails and files copied to flash drives. See which features Microsoft offers in its two licensing levels. Continue Reading
By- Reda Chouffani, Biz Technology Solutions
-
Feature
08 Jan 2021
2021 IT priorities require security considerations
AI, IoT and 5G are among the top IT priorities for CIOs and CTOs in 2021. Is your team prepared to address each tech's security needs? Continue Reading
By- Sharon Shea, Executive Editor
-
Tip
22 Dec 2020
Azure AD Premium P1 vs. P2: Which is right for you?
Azure Active Directory is more than just Active Directory in the cloud. See how the premium editions of the directory service stack up to find the best fit for your organization. Continue Reading
By -
Tip
17 Nov 2020
Explore the benefits of Azure AD vs. on-prem AD
A move to Office 365 doesn't require cutting the cord from on-premises Active Directory, but it is an option. Here's what you need to know when comparing Azure AD vs. on-prem AD. Continue Reading
By- Reda Chouffani, Biz Technology Solutions
-
News
12 Nov 2020
New Yugabyte release boosts distributed SQL database security
Yugabyte now has row-level geo-partitioning for its open source distributed SQL database, enhanced multi-region features and several new features to improve security. Continue Reading
-
Tip
29 Oct 2020
Understanding the zero trust-SDP relationship
Zero trust is a complicated framework that spans the IT stack. Find out how software-defined perimeter can address zero trust's network-level access requirements. Continue Reading
By- John Burke, Nemertes Research
-
Tip
19 Oct 2020
Zero-trust implementation begins with choosing an on-ramp
Zero-trust security has three main on-ramps -- each with its own technology path. For a clear-cut zero-trust implementation, enterprises need to choose their on-ramp wisely. Continue Reading
By- Johna Till Johnson, Nemertes Research
-
News
07 Oct 2020
Ping acquires blockchain identity startup ShoCard
Ping accelerated its push into the personal identity management market with the acquisition of ShoCard, which uses a blockchain-based platform to manage consumer identities. Continue Reading
By- Rob Wright, Senior News Director
-
Quiz
05 Oct 2020
Quiz: Network security authentication methods
There are many methods available to authenticate users requesting access to an organization's systems. Test your knowledge with this quiz on authentication in network security. Continue Reading
By- Katie Donegan, Social Media Manager
-
Opinion
21 Aug 2020
Remote work fuels identity and access management market
Channel partners have an opportunity to help customers adopt and implement identity and access management programs across their organizations. Learn more about IAM offerings. Continue Reading
By- Michael Mahar
-
Tip
11 Jun 2020
3 key identity management tips to streamline workflows
Organizations must audit IAM processes to ensure that opportunities to streamline workflows are not missed. Use these identity management tips to get started. Continue Reading
By- Mike Chapple, University of Notre Dame
-
Tip
10 Jun 2020
How security teams can prevent island-hopping cyberattacks
Learn how to prevent island-hopping cyberattacks to keep hackers from gaining the confidence of a phishing victim who could then accidentally commit corporate financial fraud. Continue Reading
By- Nick Cavalancia, Techvangelism
-
Feature
29 May 2020
How security testing could change after COVID-19
As companies look to bring employees back into the office, security teams must consider how to handle security testing due to initial remote work deployments and shadow IT. Continue Reading
By- Mark Whitehead, Guest Contributor
-
Tip
19 May 2020
Top 2 post-COVID-19 CISO priorities changing in 2020
CISO priorities for 2020 were upended when the COVID-19 pandemic hit. Learn two ways forward-thinking CISOs are planning to deal with the new normal. Continue Reading
By- Ashwin Krishnan, StandOutin90Sec
-
Tutorial
04 May 2020
Find and lock down lax Windows share permissions
With help from PowerShell, you can identify the shares that need adjustments across your infrastructure then use a script to fix them to protect sensitive data. Continue Reading
By -
Feature
20 Apr 2020
Zero-trust management challenges outweighed by benefits
The zero-trust model's adoption, deployment and management challenges are easily outweighed by its ability to offset modern threats, IEEE senior member Jack Burbank advises. Continue Reading
By- Sharon Shea, Executive Editor
-
Opinion
12 Mar 2020
The future of facial recognition after the Clearview AI data breach
The company that controversially scrapes data from social media sites for law enforcement clients announced a data breach. What does it mean for the future of facial recognition? Continue Reading
By- Kjell Carlsson
-
Opinion
03 Mar 2020
Idaptive adds new remote employee onboarding option & passwordless authentication to Next-Gen Access
Seeing more and more vendors jump on the passwordless train makes my heart swell! Continue Reading
By- Kyle Johnson, Technology Editor
-
Tip
26 Feb 2020
Stop business email compromise with three key approaches
Why is BEC such a popular attack? Because it works, unfortunately, tempting hackers with huge potential payouts. Learn how to keep them from lining their pockets with your assets. Continue Reading
By- Nick Cavalancia, Techvangelism
-
Opinion
10 Feb 2020
Idaptive is taking machine learning for authentication and applying it to authorization
We’ve seen AI/ML/analytics used for figuring out if a user is who they say they are. Now, how about if they’re doing what they should? Continue Reading
By -
Tip
02 Jan 2020
5 steps to a secure cloud control plane
A locked-down cloud control plane is integral to maintaining cloud security, especially in multi-cloud environments. Here are five steps to a secure cloud control plane. Continue Reading
By- Dave Shackleford, Voodoo Security
-
Opinion
17 Dec 2019
Login.gov starts to fill the gap between social logins and enterprise identities
Access federal services with a service designed for governmental use but that uses common standards. Continue Reading
By- Kyle Johnson, Technology Editor
-
Tip
20 Nov 2019
How to use and manage BitLocker encryption
Built into business versions of the Windows OS, Microsoft BitLocker encryption is an integral enterprise encryption tool. Read on to learn how BitLocker works and how to manage it. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
- Tony Bradley, Bradley Strategy Group
-
Feature
18 Nov 2019
IAM-driven biometrics in security requires adjustments
IAM is foundational to cybersecurity, but the latest systems use biometrics and other personal data. Learn how to cope with the resulting compliance and privacy issues. Continue Reading
-
Tip
18 Nov 2019
Biometric data privacy, ethical questions complicate modern IAM
Use of biometrics in IAM systems may help secure company systems and data, but it also raises privacy issues. Here's how to keep both your security and ethical standards high. Continue Reading
By- Ashwin Krishnan, StandOutin90Sec
-
Feature
07 Nov 2019
Creating and managing a zero-trust security framework
IEEE senior member Kevin Curran outlines how enterprises should introduce a zero-trust security framework and discusses implementation challenges they are likely to face. Continue Reading
By- Sharon Shea, Executive Editor
-
Opinion
14 Oct 2019
Okta is making big investments in on-premises identity
Okta is also working to bring more context into access decisions. Continue Reading
By -
News
03 Oct 2019
Ping Identity launches identity and access management tool
PingCentral aims to streamline the identity and access management processes and bridge the gap between IAM teams and application teams to improve productivity. Continue Reading
-
Tip
25 Sep 2019
How to rebuild the SYSVOL tree using DFSR
Active Directory is the key component in many organizations to keep tabs on access and identity. If the SYSVOL directory disappears, these steps can get the system fixed. Continue Reading
By- Richard Siddaway, Independent consultant
-
Tip
17 Sep 2019
RPA security best practices include access control, system integration
Robotic process automation can revolutionize enterprise workflows, but if RPA security risks aren't controlled, bots could end up doing more harm than good. Continue Reading
By- Kevin Tolly, The Tolly Group
-
Conference Coverage
14 Aug 2019
Latest news from the Black Hat 2019 conference
Learn the latest from this year's Black Hat conference, Aug. 3 to 8. Our team is in Las Vegas to report on what's new in information security risks, trends and defense tactics. Continue Reading
By- Brenda L. Horrigan, Executive Managing Editor
-
News
02 Aug 2019
CloudKnox Security adds privileged access features to platform
CloudKnox Security updated its Cloud Security Platform with features such as Privilege-on-Demand, Auto-Remediation for Machine Identities and Anomaly Detection. Continue Reading
By -
Feature
01 Aug 2019
New tech steers identity and access management evolution
IAM is evolving to incorporate new technologies -- like cloud-based services and containerization -- promising more secure, granular management of access to company IT assets. Continue Reading
By- Alissa Irei, Senior Site Editor
- 01 Aug 2019
-
Opinion
01 Aug 2019
Is your identity management up to the task?
IAM is an organization's best defense for its weakest link, end users. Make sure you're following the right framework and keeping your tools honed and ready for battle. Continue Reading
By- Ben Cole, Executive Editor
- 01 Aug 2019
- E-Zine 01 Aug 2019
-
Opinion
24 Jul 2019
What's the difference between a password and a PIN?
A question I've always had but was too afraid to ask when I first learned about passwordless experiences. Continue Reading
By- Kyle Johnson, Technology Editor
-
Opinion
23 Jul 2019
A look at MobileIron’s zero sign-on and passwordless authentication plans
MobileIron’s “zero sign-on” tech uses phones to authenticate when accessing SaaS apps from unmanaged devices. Continue Reading
By -
Feature
10 Jul 2019
Identity management strategy starts with people, not technology
Organizations have the tough job of creating an overarching view of identity inside and out of the company. One thing they should remember? Focus on people rather than technology. Continue Reading
By- Jesse Scardina, News Writer
-
News
01 Jul 2019
IAM market evolves, but at a cost
At a recent security and identity conference, attendees discussed the IAM market in clear terms: Shiny new features might be cool, but practicality reigns. Continue Reading
By- Jesse Scardina, News Writer
-
Feature
28 Jun 2019
Identity access management at a crossroads
In this Q&A, Ping Identity CEO Andre Durand explains why identity management is being subsumed by security and how AI and automation will modernize identity management systems. Continue Reading
By- Jesse Scardina, News Writer
-
Feature
28 Jun 2019
Comparing EDR tools: Cybereason vs. CrowdStrike vs. Carbon Black
Learn how tools from leading EDR vendors Cybereason, CrowdStrike and Carbon Black compare when it comes to helping security teams fight endpoint threats and respond to incidents. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Tip
28 Jun 2019
How to retool incident response best practices for the digital age
As companies become more cloud- and mobile-centric, they need to reassess their incident response best practices and automate as much as possible. Continue Reading
By- Johna Till Johnson, Nemertes Research
-
Feature
26 Jun 2019
Build a proactive cybersecurity approach that delivers
Whether it's zero-trust, adaptive security or just plain common sense, IT leaders must embrace an approach to IT security that's proactive, not reactive. Continue Reading
By- Stan Gibson, Stan Gibson Communications
-
Tip
25 Jun 2019
What identity governance tools can do for your organization
Learn how to evaluate available security tools that manage the governance of your users' identity and access to company systems and data. Continue Reading
By- Johna Till Johnson, Nemertes Research
-
News
18 Jun 2019
Netskope announces enterprise application security platform
Netskope for Private Access is a cloud-based platform that secures private enterprise applications on public clouds and in on-premises data centers using zero-trust access. Continue Reading
-
News
15 May 2019
Kaseya acquisition trail continues with ID Agent -- is DR next?
ID Agent, the latest Kaseya acquisition, adds its identity protection capabilities to IT Complete and will be integrating with Spanning and Unitrends products. Continue Reading
By -
Answer
13 May 2019
How does an identity and access management framework work?
A comprehensive identity and access management framework is an IT necessity. But how do the two components work together? Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Quiz
15 Apr 2019
Mobile authentication best practices quiz for IT pros
IT pros can secure mobile endpoints with the right mobile authentication best practices, but they must know about new technologies and use cases to enforce them properly. Continue Reading
By- John Powers, Senior Site Editor
-
Feature
04 Apr 2019
Tackle mobile device authentication with modern methods
Mobile user authentication should require more than a password. New technologies enable authentication methods that IT should consider for its mobile deployment. Continue Reading
By- John Powers, Senior Site Editor
-
Tip
28 Mar 2019
Benefits of direct autonomous authentication for mobile
Direct autonomous authentication, a new mobile technology, authenticates users with mobile carrier technology faster than typical two-factor authentication methods. Continue Reading
-
Tip
20 Mar 2019
How automated patch management using SOAR can slash risk
Learn how to use security orchestration, automation and response, also known as SOAR, to ease the hassle of mundane tasks related to patch management. Continue Reading
By- Mike Chapple, University of Notre Dame
-
Tip
20 Mar 2019
Automating incident response with security orchestration
Security orchestration, automation and response technology is now seen as a key aid to security pros attempting to thwart an onslaught of cyberattacks. Continue Reading
By- Mike Chapple, University of Notre Dame
-
Tip
20 Mar 2019
Plugging the cybersecurity skills gap with security automation
Security automation and response promises to help alleviate the shortage of qualified cybersecurity pros. Learn how SOAR helps security teams work smarter, not harder. Continue Reading
By- Mike Chapple, University of Notre Dame
-
Conference Coverage
07 Mar 2019
RSAC 2019: Coverage of the premiere security gathering
Find out what's happening at the at the 2019 RSA Conference in San Francisco, the information security industry's biggest event, with breaking news and analysis by the SearchSecurity team. Continue Reading
By- Madelyn Bacon, TechTarget
-
News
07 Mar 2019
Cryptography techniques must keep pace with threats, experts warn
Cryptographers at RSAC 2019 discussed personal data protection laws and challenges, future threats and the pressure for tech companies to work with law enforcement on decryption. Continue Reading
By- Bridget Botelho, Editorial Director, News
-
Feature
23 Jan 2019
Three examples of multifactor authentication use cases
When evaluating the business case for multifactor authentication, an organization must first identify how these three operational scenarios apply to a potential implementation. Continue Reading
By -
Tip
11 Jan 2019
CIAM vs. IAM: The key differences 'customer' makes
Find out everything you need to know about the nuances that differentiate customer IAM from traditional IAM so that you can implement the CIAM system at your organization. Continue Reading
By- Ed Moyle, Drake Software
-
Tip
17 Dec 2018
For effective customer IAM, bundle security and performance
CIAM can verify identity, manage access and deliver a smooth experience for customers. Get an expert's insights on how to tackle customer IAM now. Continue Reading
By- Johna Till Johnson, Nemertes Research
-
Tip
10 Dec 2018
5 actionable deception-tech steps to take to fight hackers
Consider taking these five 'deceptive' steps to make your detection and response capabilities speedier, more effective and to improve your company's security posture. Continue Reading
By- Dave Shackleford, Voodoo Security
-
Podcast
30 Nov 2018
Risk & Repeat: DeepMasterPrints spells trouble for biometrics
This week's Risk & Repeat podcast looks at the future of biometric authentication after researchers unveiled a new approach that uses neural networks to bypass fingerprint scanners. Continue Reading
By- Rob Wright, Senior News Director
-
News
21 Nov 2018
DeepMasterPrints fake fingerprints can fool fingerprint sensors
Researchers have developed AI-generated synthetic fingerprints -- known as DeepMasterPrints -- that can spoof biometric scanners and potentially be used to launch practical attacks. Continue Reading
By- Michael Heller, TechTarget
-
Podcast
20 Nov 2018
Risk & Repeat: Who's to blame for bad passwords?
This week's Risk & Repeat podcast discusses whether users are responsible for creating and reusing weak passwords or if the technology systems themselves are to blame. Continue Reading
By- Rob Wright, Senior News Director
-
Feature
09 Nov 2018
Jumio identity verification technology benefits from AI
ID verification technology is boosted by products of AI and machine learning, including natural language processing, image processing and biometric tools. Continue Reading
By -
Feature
24 Aug 2018
Weighing privileged identity management tools' pros and cons
Products that help security pros manage access privileges are essential to IT security. Learn how to evaluate market offerings and acquire the best for your company. Continue Reading
By -
Guide
09 Aug 2018
Advances in access governance strategy and technology
Recent advances in IAM policy, strategy and technology are raising companies' ability authenticate identities and manage access to their systems and data. Continue Reading
-
News
20 Jul 2018
Microsoft launches Identity Bounty Program, offers up to $100,000
Microsoft introduced its new Identity Bounty Program that offers up to $100,000 in rewards for reported vulnerabilities in its identity services, such as Azure Active Directory. Continue Reading
By- Rob Wright, Senior News Director
-
News
20 Jul 2018
As AI identity management takes shape, are enterprises ready?
Experts at the Identiverse 2018 conference discussed how artificial intelligence and machine learning are poised to reshape the identity and access management market. Continue Reading
By- Rob Wright, Senior News Director
-
Answer
12 Jul 2018
What are the Microsoft IRM requirements for Exchange 2016?
Before a company can take advantage of information rights management on the Exchange 2016 platform, administrators must ensure the server setup meets the technical requirements. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
Answer
11 Jul 2018
How do you use Outlook IRM to protect email content?
The information rights management feature in Exchange prevents unauthorized parties from viewing sensitive content. Admins can tailor the settings to fit the company's needs. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
Podcast
06 Jul 2018
Risk & Repeat: Is AI-driven identity management the future?
In this week's Risk & Repeat podcast, SearchSecurity editors discuss Identiverse 2018 and how artificial intelligence is being applied to identity and access management. Continue Reading
By- Rob Wright, Senior News Director
-
News
26 Jun 2018
Ping adds AI-driven API protection with Elastic Beam acquisition
Ping Identity increased its focus on API security with the acquisition of Elastic Beam, a startup that uses artificial intelligence to apply behavioral security on enterprise APIs. Continue Reading
By- Rob Wright, Senior News Director
-
News
29 May 2018
Identity and access management tools add AI, microservices
AI and as-a-service platforms enable IT to take a more hands-off approach. But with adoption in the early stages, most IT pros wonder what the future holds for identity management. Continue Reading
By -
Answer
03 May 2018
How do admins check the Exchange IRM setup?
Testing Exchange information rights management functionality can be tedious, but Microsoft offers a dedicated cmdlet for Exchange 2016 administrators that streamlines the process. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
Answer
05 Apr 2018
How can IT combat rogue RDP access?
Hackers can gain remote access to users' desktops through RDP hijacking. As a result, IT pros must know what they can do to prevent such an attack. Continue Reading
By -
News
27 Feb 2018
New SAML vulnerability enables abuse of single sign-on
Duo Security discovered a new SAML flaw affecting several single sign-on vendors that allows attackers to fool SSO systems and log in as other users without their passwords. Continue Reading
By- Rob Wright, Senior News Director
-
Tip
19 Sep 2017
How to balance organizational productivity and enterprise security
It's no secret that enterprise security and organizational productivity can often conflict. Peter Sullivan looks at the root causes and how to address the friction. Continue Reading
-
Tip
17 Aug 2017
Common web application login security weaknesses and how to fix them
Flawed web application login security can leave an enterprise vulnerable to attacks. Expert Kevin Beaver reviews the most common mistakes and how to fix them. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Tip
09 Aug 2017
Are biometric authentication methods and systems the answer?
Biometric authentication methods, like voice, fingerprint and facial recognition systems, may be the best replacement for passwords in user identity and access management. Continue Reading
By -
Podcast
12 Jul 2017
Risk & Repeat: Should IAM systems be run by machine learning?
In this week's Risk & Repeat podcast, SearchSecurity editors discuss the identity and access management industry and how machine learning algorithms could govern IAM systems. Continue Reading
By- Rob Wright, Senior News Director
-
Feature
12 Jul 2017
Q&A: Ping CEO on contextual authentication, intelligent identity
Ping Identity CEO Andre Durand talks with SearchSecurity about the data-driven move toward contextual authentication and intelligent identity and what this means for enterprises. Continue Reading
By- Rob Wright, Senior News Director
-
E-Zine
10 Jul 2017
The best endpoint security practices are evolving and essential
Ever since the first mobile device hit the enterprise network, best endpoint security practices have been a major IT concern. What's happened since then has been a staggering proliferation of the number and types of devices on the network, complicated by increasing numbers of mobile and remote corporate employees, all of which have essentially ended the traditional idea of a corporate network security perimeter. Firewalls and other more traditional security appliances may still be in use, and rightly so, but endpoint security management is more critical than ever in keeping enterprise systems and data safe from malicious actors.
The summer Insider Edition, our Information Security magazine quarterly e-zine, looks at what's new in endpoint security management, from the best endpoint security tools to consider now, and what other efforts beyond tools infosec pros can employ to best secure all those pesky mobile endpoints wandering in and out of corporate corridors.
This Insider Edition offers expert assessments on the endpoint security technology vendors have developed to combat mutating ransomware like WannaCry -- from machine learning to multivendor partnerships to behavior analytics. Also included is an exploration of mobile endpoint security tools like application containers and app wrapping. CISOs must focus now on how the threats, and the technological advances to fight them, are changing and factor these considerations into any endpoint security strategy.
Readers will come away with a deeper understanding of the best endpoint security tools and techniques available and be able to consider the most advanced approaches available to locking down the company data and systems that endpoints can access.
Continue Reading -
Feature
10 Jul 2017
Advanced endpoint protection takes on the latest exploits
Advanced endpoint protection is arriving from all quarters -- machine learning, crafty sandboxes, behavior analytics. Learn how tech advances are being applied to endpoints. Continue Reading
By- David Geer, Geer Communications
-
Opinion
10 Jul 2017
Do thoughts of your least secure endpoint keep you up at night?
Some days, 'secure endpoint' feels like an oxymoron, but that soon may change. From smart sandboxes to advanced behavior analytics, learn what's new in endpoint security technologies. Continue Reading
By- Brenda L. Horrigan, Executive Managing Editor
-
News
22 Jun 2017
Machine learning in cybersecurity is coming to IAM systems
Machine learning in cybersecurity applications for identity management systems are becoming more common today. But will algorithms be the best option for authenticating and authorizing users? Continue Reading
By- Rob Wright, Senior News Director
-
News
21 Jun 2017
Ping embeds multifactor authentication security in mobile apps
At the 2017 Cloud Identity Summit, Ping Identity launched a new software development kit that will embed multifactor authentication security features in mobile apps. Continue Reading
By- Rob Wright, Senior News Director
-
Tip
25 May 2017
How SSH key management and security can be improved
The widespread use of SSH keys is posing security risks for enterprises due to poor tracking and management. Expert Michael Cobb explains how some best practices can regain control over SSH. Continue Reading
By -
Answer
12 May 2017
How did a Slack vulnerability expose user authentication tokens?
A Slack vulnerability exposed user authentication tokens and enabled hackers to access private data. Expert Matthew Pascucci explains how and why this hack was successful. Continue Reading