May 12, 2017
A Slack vulnerability exposed user authentication tokens and enabled hackers to access private data. Expert Matthew Pascucci explains how and why this hack was successful.
March 22, 2017
In this episode of SearchSecurity's Risk & Repeat podcast, editors discuss the indictments of the alleged Yahoo hackers and how the attackers minted Yahoo authentication cookies.
January 10, 2017
Telstra's implementation of Kony wins a Modern Mobility Innovation Award because it relied on user feedback to build a productivity-boosting HR mobile app.
December 07, 2016
The final cybersecurity report from the Obama administration covered issues, including authentication, identity, infrastructure, cyberthreats and cooperation, but experts disagree on the key points.
Authentication Get Started
Bring yourself up to speed with our introductory content
Massive IoT, one of the main application segments for 5G identified by standard body 3GPP, requires strong security to defend against targeted attacks. Continue Reading
ID management and authentication help IT answer the burning questions of who is accessing the company network, when, where and on what device. Continue Reading
In Windows 10, users can change their authentication method, tweak the Start menu, choose their default save locations and more. Here's how. Continue Reading
Evaluate Authentication Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
VPN evolution has seen a shift in connectivity -- from point-to-point to sophisticated, multipoint connectivity systems. Continue Reading
Expert Karen Scarfone takes a look at the OpenVPN Access Server SSL VPN for securing network traffic by providing encrypted tunnels to the enterprise. Continue Reading
Researchers identified 110 malicious Tor HSDirs that were found snooping information. Expert Kevin Beaver discusses the takeaways from this research for enterprises. Continue Reading
Learn to apply best practices and optimize your operations.
There are multiple facets to ensuring a safe, connected environment; here's how three IoT security companies are facing device discovery and authentication head on. Continue Reading
Companies can expect data threats to proliferate in 2017. To help, security experts outline resolutions organizations should make to bolster their cybersecurity strategies. Continue Reading
Enterprises are constantly bombarded by mobile security threats, and it's up to IT pros to thwart them. There are six key items that belong on IT's mobile security checklist. Continue Reading
Problem Solve Authentication Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
While news of wearable hacks is making headlines, don't tear the device off your wrist just yet. Let's assess the likelihood of an attack on authentication sensor data. Continue Reading
CloudFanta is a new kind of malware threatening enterprises. Expert Rob Shapland explains how it leverages cloud storage site SugarSync to infect users and enterprises. Continue Reading
Users require access to virtual resources on their mobile devices. IT can manage VDI on smartphones and tablets using authentication methods, individual virtual app delivery and more. Continue Reading