Tips
Tips
Web authentication and access control
-
How machine learning-powered password guessing impacts security
A new password guessing technique takes advantage of machine learning technologies. Expert Michael Cobb discusses how much of a threat this is to enterprise security. Continue Reading
-
Use caution with OAuth 2.0 protocol for enterprise logins
Many apps are using the OAuth 2.0 protocol for both authentication and authorization, but technically it's only a specification for delegated authorization, not for authentication. Continue Reading
-
Learn how to identify and prevent access control attacks
Once an attacker has gained entry to a network, the consequences can be severe. Find out how the right access control tools can help prevent that from happening. Continue Reading
-
Common web application login security weaknesses and how to fix them
Flawed web application login security can leave an enterprise vulnerable to attacks. Expert Kevin Beaver reviews the most common mistakes and how to fix them. Continue Reading
-
Why authorization management is paramount for cybersecurity readiness
After enterprise identities are authenticated, an authorization management system should monitor how resources are being used. Expert Peter Sullivan explains how it can work. Continue Reading
-
How to use hashcat to address authentication vulnerabilities
Authentication vulnerabilities are a constant problem, but testing tools like hashcat can make a significant difference. Expert Joe Granneman discusses hashcat and password cracking. Continue Reading
-
A safe password system? Here's how
News of the death of the password system is premature, despite the security vulnerabilities of this authentication method. Learn how to create a safe password system. Continue Reading
-
How to limit privileged accounts and boost security
Too many privileged accounts can result in access abuse in enterprises. Expert Mike O. Villegas discusses which account privileges should be limited to reduce security incidents. Continue Reading
-
The enterprise potential of behavioral biometrics
Biometric authentication has quickly evolved to include behavioral identifiers. Expert Michael Cobb explores the benefits of behavioral biometric technology for enterprises. Continue Reading
-
Microsoft Edge security features raise the bar in Web browser safety
Learn about the new and improved security features in the upcoming Microsoft Edge browser, including on-by-default sandboxes, Passport and HTML5. Continue Reading
-
The benefits of open source identity management software
Organizations are often looking to minimize costs without compromising on security. Expert Randall Gamby examines the benefits of open source identity management software. Continue Reading
-
Malware defense: Mitigating malware hiding as digitally signed software
Malware leveraging PKI and digital signatures is increasingly common. Nick Lewis explains the threat and five key defense strategies. Continue Reading
-
Adaptive authentication: An introduction to risk-based authentication
Enterprise use of adaptive authentication is growing internally and for Web applications. Brad Causey details the allure of risk-based authentication. Continue Reading
-
Analysis: Enterprise password management tools have room to improve
Explore the differences between consumer and enterprise password management products and learn pros and cons about the latest tools. Continue Reading
-
Intro to two-factor authentication in Web authentication scenarios
The Web's top brands are implementing two-factor authentication for consumer Web authentication. Learn 2FA benefits, burdens and how to get started. Continue Reading