February 07, 2018
A Grammarly vulnerability in its browser extension authentication could have exposed users' sensitive documents if the popular spelling and grammar checker were left unpatched.
January 05, 2018
Users of Dell EMC data protection are being urged to quickly patch three security flaws that could hijack Avamar-based products. The vulnerabilities revolve around Avamar Installation Manager, a ...
October 02, 2017
Java EE security has always been a mixed bag in terms of simplicity and standardization, but the new Java EE Security API, JSR-375, plans to change all of that.
August 30, 2017
Cloud identity authentication specialist Okta has used its Oktane 2017 conference and exhibition to attempt to explain how software application developers should approach identity as a key element ...
Authentication Get Started
Bring yourself up to speed with our introductory content
FIDO (Fast ID Online) is a set of technology-agnostic security specifications for strong authentication. FIDO is developed by the FIDO Alliance, a non-profit organization that seeks to standardize authentication at the client and protocol layers. Continue Reading
Here are five things you can do to successfully prepare and run authenticated vulnerability scanning and, in the end, achieve the most protection. Continue Reading
Organizations are recognizing the need for network access control systems, but it is important to evaluate and perform research before you invest in enterprise NAC products. Continue Reading
Evaluate Authentication Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
If unsafe computer systems scare the living daylights out of you, tune into this webinar on how to do authenticated vulnerability scans to avoid system damage. Continue Reading
It is essential for IT pros to know all the important information about Windows 10 so they can deal with any problems or integrate new features in the OS with ease. Continue Reading
When considering mobile security, think of blockchain. Follow these tips to determine whether the security attributes of blockchain could be of benefit to your organization. Continue Reading
Learn to apply best practices and optimize your operations.
This mobile security requirements checklist outlines the vital steps for information security professionals to follow to improve mobile security in their companies. Continue Reading
When you move to PaaS for your web-based apps, remember to think about database services. Consider the benefits of moving your database to a fully supported cloud infrastructure. Continue Reading
Even if IT pros turn to a DaaS provider to deliver virtual desktops to users and take some management tasks off their plates, there are still some jobs they have to do. Continue Reading
Problem Solve Authentication Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
When it comes to scanning for vulnerabilities in Windows, IT pros need to run both authenticated and unauthenticated scans so they can see the deployment from every angle. Continue Reading
With a great end-user computing strategy comes great responsibility. IT pros must deal with app delivery challenges, user expectations and plenty more. Continue Reading
SMS authentication is often used to secure telematics information, but it may not be strong enough. Expert Judith Myerson discusses why, and how to improve the protection of this data. Continue Reading