Secure tokens News
December 02, 2016
Android app security is under attack this week with vulnerabilities in the popular app, AirDroid, and malware that steals Google account authentication tokens.
January 12, 2016
Researchers in Germany have found two OAuth vulnerabilities, which could allow attackers to break the authorization and authentication standard. And an expert said the fix must be made to the standard itself.
June 07, 2011
Following a retooling of its manufacturing and supply chain management processes, RSA plans to replace security tokens for high risk customers.
December 08, 2010
Cloud computing security will take the same route as SOA governance and XML gateways, says a noted Gartner analyst.
Secure tokens Get Started
Bring yourself up to speed with our introductory content
The AWS Security Token Service is an Amazon Web Services (AWS) software tool that enables an IT administrator to grant trusted users temporary and limited access credentials to public cloud resources. Continue Reading
Complex compliance mandates can lead to compliance fatigue. Expert Mike Chapple explains how to develop an effective compliance management plan. Continue Reading
Expert Adrian Lane explains why database security tools play a significant, if not the majority, role in protecting data in the enterprise data center. Continue Reading
Evaluate Secure tokens Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Which SQL Server edition is right for you? After Microsoft upgraded the Standard Edition with features from the Enterprise one, a lower cost choice might be possible in some cases. Continue Reading
Identity management is a core component of cybersecurity readiness, but there are many layers and complexities behind it. Expert Peter Sullivan explains the basics of IAM. Continue Reading
The Microsoft Office 365 SAML flaw that allowed attackers to bypass authentication was resolved quickly, but offers enterprises some important lessons. Expert Ed Moyle discusses. Continue Reading
Manage Secure tokens
Learn to apply best practices and optimize your operations.
IBM name/tokens are popular for sharing data among mainframe programs, but little problems can add up to a performance hit. Continue Reading
Expert Dave Shackleford says cloud tokenization technology is becoming an attractive alternative to cloud encryption, but problems persist. Continue Reading
With PCI DSS and other compliance requirements, organizations are looking for surefire solutions to protect payment card and other sensitive data. Tokenization and end-to-end encryption have emerged as promising technologies, but as Dave Shackleford explains, both have benefits and drawbacks that organizations must consider. Continue Reading
Problem Solve Secure tokens Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A Google Docs phishing attack used OAuth tokens to affect more than a million Gmail users. Nick Lewis explains how it happened, and how to defend against such an attack. Continue Reading
AWS offers a myriad of native tools and services that enterprises can use to protect their clouds. Sharpen your knowledge of these services, and tighten up your cloud. Continue Reading
Man-in-the-cloud attacks on file sharing services can lead to confidential data leakage. Expert Rob Shapland explains how to mitigate the threat. Continue Reading