Access Control

Access Control | News, how-tos, features, reviews, and videos

Multi-factor authentication (MFA) / two-factor authentication (2FA) / one-time security code
Multifactor authentication  >  A mobile phone displays a digital key to a lock on a user's laptop.

Conceptual image of a network labeled 'Zero Trust.'

How legacy tech impedes zero trust and what to do about it

Old perimeter-based defenses can throw up roadblocks to implementing a zero-trust strategy, but a measured, phased approach will see you through.

Conceptual image of password entry amid binary code.

Dashlane launches new Dark Web Insights tool, MFA authenticator app, small biz Starter plan

Password manager vendor releases new credential security and support service features, along with a new low-cost option for small businesses.

Dell Active Pen

Dell launches new cybersecurity resources to enhance zero-trust adoption, cyber resilience

Dell announces several new cybersecurity resources including a Zero Trust Center of Excellence that will incorporate the US Department of Defense Zero Trust Reference Architecture.

VPN on iPhone

97% of enterprises say VPNs are prone to cyberattacks: Study

Since the shift to remote and hybrid work, 44% of organizations have witnessed an increase in exploits targeting VPNs, and many are moving toward zero-trust security, according to a report from Zscaler.

A binary mask.

The deepfake danger: When it wasn’t you on that Zoom call

Deepfakes pose a real threat to security and risk management and it’s only going to get worse as the technology develops and bad actors can access malicious offerings such as deepfakes as a service.

Multifactor authentication  >  A mobile phone displays a digital key to a lock on a user's laptop.

Multi-factor authentication fatigue attacks are on the rise: How to defend against them

LAPSUS$ is just one cybercriminal group that has breached networks of large companies such as Uber and Microsoft by spamming employees with MFA authentication requests.

The trouble with 2fa

With a large percentage of your workforce now working remotely, two-factor authentication (2fa) can make them (or your company data) safer online. But how you're doing it now probably isn't helping much at all.

12 famous passwords used through the ages

Passwords seem like a recent thing, but they've been in use for a long time. Here are a dozen of the more memorable ones.

enter neon sign do not tresspass privacy authentication access barbed wire by clem onojeghuo unspla

Intro to crypto wallet authentication

A blockchain enabled cybersecurity future is coming fast, with crypto wallets set to become a central authentication mechanism.

password azure protection security policy

How Azure Active Directory opens new authentication risks

Hybrid cloud identity and access management services add complexity and opportunity for attackers to network authentication processes, as recently demonstrated for Azure AD.

A large 'X' marks a conceptual image of a password amid hexadecimal code.

Dashlane launches integrated passkey support for password manager with new in-browser passkey solution

Dashlane's passkey support allows users to authenticate to their password vaults without a password.

zero trust security model secured network picture id1313494602

Sorting zero-trust hype from reality

Zero trust is not a product, but a security methodology based on defense-in-depth and least-privileged access concepts.

stephanie franklin thomas 1200x800

How ABM built a cohesive security program around zero trust

CISO Stephanie Franklin-Thomas advances ABM’s security program with a holistic approach to zero trust, putting equal emphasis on people, process, and technology.

Zero-trust

What is zk-SNARK?

An intro to the most popular zero-knowledge protocol

Top cybersecurity products unveiled at Black Hat 2022

Here are some of the most interesting new products launched at Black Hat USA 2022, including zero trust, extended detection and response (XDR), and a host of other threat and vulnerability management offerings.

zero trust

Axis adds automation, onboarding features to Atmos ZTNA network access software

Axis is also offering migration tools and a buyback program for those looking to move from legacy ZTNA (zero trust network access) applications.

cso security access granted breach hack identity theft gettyimages 1191670668 by reklamlar 2400x160

Teleport features passwordless access with new access plane update

With the new capability, Teleport hopes to replace usernames, passwords, private keys, and other secrets with more secure physical identity solutions such as Touch ID, Windows Hello and Trusted Platform Module hardware.

Conceptual image of a password amid hexadecimal code.

Passwordless company claims to offer better password security solution

Stytch's business is getting rid of passwords so why is it trying to "modernize" their use?

Load More
You Might Also Like