September 07, 2017
LAS VEGAS -- For an example of the transformative role drones -- or unmanned aerial vehicles, as they're known in the industry -- will play across industries, just consider, said Michael Huerta, ...
March 20, 2017
The next Kubernetes update will offer role-based access control, while users wait for other portions of the Kubernetes roadmap to address setup and upgrade complexity.
February 03, 2017
Just who and what have you got connected to the network? If it was just a matter of regular IT products and employees, that would be hard enough. Now all manner of smart devices and itinerant ...
November 10, 2016
An enterprising Australian hot dog enthusiast faces a massive fine after using a drone to collect a sausage from a barbecue at a Melbourne DIY store, and delivering it direct to his hot tub in the ...
Authorization Get Started
Bring yourself up to speed with our introductory content
If you get clumsy with AWS security, you can put your whole business at risk. Be wary of these common errors, and implement best practices to secure your workloads. Continue Reading
In this excerpt from chapter 11 of Security Controls Evaluation, Testing, and Assessment Handbook, author Leighton Johnson discusses access control. Continue Reading
Performance, posting and missing authorization issues are some of the problems business users may face while using SAP Project Builder. Here's how to troubleshoot them. Continue Reading
Evaluate Authorization Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
How prepared is your organization for a cyberattack? Expert Peter Sullivan outlines the seven steps enterprises need to take in order to achieve cybersecurity readiness. Continue Reading
Migrating to electronic prior authorization software offers a chance to improve revenue cycle operations and reduce complexity, which can be a win for all involved. Continue Reading
Geofencing technology is increasingly being used as a security tactic, such as to control access to servers with DNS settings. Expert Michael Cobb explains how it works. Continue Reading
Learn to apply best practices and optimize your operations.
Microservices can be a dream -- or a nightmare. Systems architect Gwen Shapira explains why scattered business logic can quickly cause problems for adopters of this architecture. Continue Reading
Admins can use vSphere permissions to assign VM controls to different IT groups within their enterprise. Follow the networking example below to get started. Continue Reading
In this excerpt from chapter three of Mobile Data Loss, author Michael T. Raggo discusses mobile security countermeasures. Continue Reading
Problem Solve Authorization Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A recently discovered Android app permissions flaw can expose users to attacks. Michael Cobb explains what the risks are and how Android O security will help users. Continue Reading
Despite their name, containers are by no means impervious to threats. With their use expected to grow, the time is ripe for determining the best security for containers. Continue Reading
The three different SELinux modes -- Enforcing, Permissive and Disabled -- dictate how admins can secure and troubleshoot applications with the SELinux system. Continue Reading