Access Control

Access Control | News, how-tos, features, reviews, and videos

Many keys, one lock  >  Brute-force credential stuffing.
hot and cold fire and ice clash temperature

CSO  >  secure mergers + acquisitions / floating puzzles pieces / abstract security mechanisms

Top cybersecurity M&A deals for 2021

The cybersecurity market is hot, and vendors are buying competitors to solidify their position or acquiring other firms to expand their offerings.

iot security startups hot highlights planets rocket lock security

18 cybersecurity startups to watch

Security startups are often innovation leaders that attempt to solve critical and persistent problems. These are some of the most interesting ones to watch as they tackle issues around multicloud security, identity management,...

currency / money / coins

Cybersecurity spending trends for 2022: Investing in the future

As security budgets continue to rise, where is the money going? Recent surveys offer insight into CISO spending for the year ahead.

high priority gauge

Security priorities for 2022: Advancement, not revolution

Security leaders say their priorities reflect security needs due to recent shifts in their organization’s IT and business environments, a changing threat landscape, and emerging risks.

A person leaps between platforms surrounded by sharks. [danger / risk / challenges]

Enhancing zero trust access through a context-aware security posture

Cybercriminals prefer to attack organizations at sensitive times such as during a merger or earnings release. Adjusting zero-trust policies during those times will help mitigate that risk.

Multi-factor authentication (MFA) / two-factor authentication (2FA) / one-time security code

8 top multifactor authentication products and how to choose an MFA solution

Learn the key considerations when choosing an MFA solution and why these top picks are worth a look.

CSO  >  Right and wrong buttons and question marks

6 zero trust myths and misconceptions

If you’ve fallen for one of these myths, you may need to rethink your zero trust strategy.

authentication

SAML explained: How this open standard enables single sign on

Security Assertion Markup Language (SAML) is a standard that defines how providers can offer both authentication and authorization services. Here's what you need to know.

data security / padlock / binary code / digital display

6 ways the pandemic has triggered long-term security changes

With some changes prompted by COVID-19 likely to be permanent, enterprises will need to revise their data security strategies.

basics / building a foundation / how-to / process / steps / stacking blocks

5 steps toward real zero trust security

Looking to advance in your zero trust journey? These steps will keep your strategy on track.

digital identity / authentication

Consumers are done with passwords, ready for more innovative authentication

Surveys indicate that consumers are becoming more open to biometrics and multi-factor authentication.

botnet

Cybercriminals bypass 2FA and OTP with robocalling and Telegram bots

The automated bots are highly successful because they effectively emulate legitimate service providers.

Unitd States cybersecurity   >   U.S. flag with a digital network of locks instead of stars

Federal agencies face new zero-trust cybersecurity requirements

The OMB and CISA issue guidance to move all federal agencies to a shared zero-trust maturity model for FY22-24. The catch: No new funding.

access control / authentication / privileges / security / key

NTLM relay attacks explained, and why PetitPotam is the most dangerous

Attackers can intercept legitimate Active Directory authentication requests to gain access to systems. A PetitPotam attack could allow takeover of entire Windows domains.

binary code flows around a corporate structure / cybersecurity / technology companies

The 10 most powerful cybersecurity companies

What makes these 10 security vendors the biggest power players? We break it down.

login credential - user name, password - administrative controls - access control - single sign-on

How to find the right testing tool for Okta, Auth0, and other SSO solutions

Implementing a single sign-on solution can be complicated, especially if you have apps that are not in the SSO vendor's catalog. These tools can simplify the process.

iot internet of things chains security by mf3d getty

IoT devices have serious security deficiencies due to bad random number generation

It's not the IoT vendors' fault. Lack of a cryptographically secure pseudo-random number generator subsystem for the internet of things devices will be vulnerable.

Conceptual image of a network labeled 'Zero Trust.'

7 tenets of zero trust explained

Cut through the hype. NIST's core zero trust elements provide a practical framework around which to build a zero trust architecture.

Load More
You Might Also Like