Access Control

Access Control | News, how-tos, features, reviews, and videos

Network World: IoT Hacks [slide-06] > Lateral Attacks > Network access via a single breach point

Security versus usability a conundrum in modern identity management?

Convenience and usability vs. security when dealing with a valuable verified identity.

Man pointing to security icon for email

When your career is derailed by your girlfriend tampering with your email

Eric Abramovitz, a gifted clarinetist, had opportunity squandered when his girlfriend executed a classic "business email compromise."

TSB Phishing page

Salted Hash – SC 02: What a TSB phishing attack looks like

In April, TSB (a retail and commercial bank in the UK) announced they would shutdown some systems for an IT upgrade. However, the upgrade was a disaster, and over a month later customers are still having problems. As a result,...

facial recognition access identification biotech

Here, there, everywhere: How pervasive identity and access management transforms secure access

When users are as likely to be working on the go as at their desks, and applications are as likely to be in the cloud as on-premises, you need identity and access management everywhere.

number 4 four with binary grunge background

Why it’s time to break these 4 identity verification rules

Digital transformation of financial transactions combined with advances in fraud techniques are making these traditional approaches obsolete, as well as a barrier to online commerce.

security map digital encryption identity

Reduce cloud IT management headaches by approaching IAM the right way

Moving to the cloud has opened up new identity-related concerns and worries that we’ve never experienced before. The good news is businesses don’t have to fight the identity security battle on their own, and solutions, strategies and...

security map digital encryption identity

From NSTIC to improved federal identity, credential and access management

OMB’s ICAM policy change leverages NIST’s Digital Identity Guidelines permitting the use of non-PIV, AAL 3 credentials for logical access, and tasks agencies to accept federated credentials for consumers conducting transactions online....

The U.S. Capitol building in Washington

No Congressional background check for IT contractor charged with fraud

Imran Awan was an IT contractor to members of Congress, with access to their email servers, yet not even a basic background check was conducted.

locks on binary code

Software-defined perimeter: Important initiative, ineffective name

A geeky and confusing name doesn’t communicate business, privacy, and security benefits. Instead of software-defined perimeter, I suggest ubiquitous security access services (USAS).

login password - user permissions - administrative control

Turbo-charging your single sign-on solution

A comprehensive privileged password manager fills the SSO gaps and boosts overall data security.

fort gun defense cyber protection

What is defense in depth? Its importance grows as security layers blur

What key roles defense in depth and layered security will play in the digital age.

blue padlock in circle pixels digital security padlock

9 policies and procedures you need to know about if you’re starting a new security program

Any mature security program requires each of these infosec policies, documents and procedures.

monitoring systems

The security operations platform: automation, orchestration and more

As the security automation and orchestration market matures, features like collaboration, event & case management, plus reporting and metrics are growing in importance. Learn how burgeoning security operations platforms are finding a...

keys to access solutions closure complete

Who owns identity and access management?

Learn the best practices for integrating identity management into your business while also staying ahead of cutting edge competition.

vulnerable balance egg risk breach security

Striking a balance between customer experience, security and privacy

Everyone is a consumer with Consumer Identity and Access Management (CIAM).

man looking at exit quit termination

How to ensure that giving notice doesn’t mean losing data

The employee exit process often devolves into a fire-drill for IT teams. Having a documented process and a strong relationship with HR can help your team go from reactive to proactive.

keys to access solutions rubic cube puzzle

Role-based access control is fine – who needs attribute-based access control?

The benefits in business agility and security confidence that come from role-based access control are more than worth the effort of deployment.

hacker endpoint security vulnerability cyberattack lock

How to approach a Zero Trust security model for your enterprise

Implementing a Zero Trust model to protect your enterprise's critical systems could be worth the trouble.

keys to access solutions unlock

Dynamic authorization: a solution to navigating GDPR

With less than five months until the implementation of GDPR, organizations are scrambling to comply with the strict data security standards.

hand connect binary access

Transforming secure access to take on today’s cyber threats

Last year, 81% of cyber attacks involved compromised passwords—up from 63% the previous year. How much worse can it get? Let’s not wait around to find out.

Load More
You Might Also Like