April 02, 2018
Automated bots have made it difficult to determine whether someone online is real, but Airbnb is turning to tech to help build digital trust among its customers.
March 27, 2018
MIT researchers have developed an energy-efficient, hard-wired chip that they say will benefit IoT encryption and ease authentication processes in the IoT environment.
February 07, 2018
A Grammarly vulnerability in its browser extension authentication could have exposed users' sensitive documents if the popular spelling and grammar checker were left unpatched.
January 05, 2018
Users of Dell EMC data protection are being urged to quickly patch three security flaws that could hijack Avamar-based products. The vulnerabilities revolve around Avamar Installation Manager, a ...
Authentication Get Started
Bring yourself up to speed with our introductory content
Even if your cloud provider already complies with GDPR, you can't just take a backseat. Know what the requirements are and whether they apply to you -- or risk hefty fines. Continue Reading
FIDO (Fast ID Online) is a set of technology-agnostic security specifications for strong authentication. FIDO is developed by the FIDO Alliance, a non-profit organization that seeks to standardize authentication at the client and protocol layers. Continue Reading
Here are five things you can do to successfully prepare and run authenticated vulnerability scanning and, in the end, achieve the most protection. Continue Reading
Evaluate Authentication Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Secure access to cloud APIs is necessary but challenging. One viable option to combat that is TLS mutual authentication, according to expert Ed Moyle. Continue Reading
On-premises WLAN typically offers better performance than cloud-controlled products. Just be sure to consider these four factors, including WLAN security, when selecting a system. Continue Reading
Industrial espionage is on the rise, and more data means more risk. Find out how to control the growth of data stores and secure your organization's most valuable assets. Continue Reading
Learn to apply best practices and optimize your operations.
The Department of Homeland Security warned of a vulnerability affecting WAGO PFC200 logic devices. Discover how this flaw enables threat actors with expert Judith Myerson. Continue Reading
This mobile security requirements checklist outlines the vital steps for information security professionals to follow to improve mobile security in their companies. Continue Reading
When you move to PaaS for your web-based apps, remember to think about database services. Consider the benefits of moving your database to a fully supported cloud infrastructure. Continue Reading
Problem Solve Authentication Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
When it comes to scanning for vulnerabilities in Windows, IT pros need to run both authenticated and unauthenticated scans so they can see the deployment from every angle. Continue Reading
With a great end-user computing strategy comes great responsibility. IT pros must deal with app delivery challenges, user expectations and plenty more. Continue Reading
SMS authentication is often used to secure telematics information, but it may not be strong enough. Expert Judith Myerson discusses why, and how to improve the protection of this data. Continue Reading