Access Control
Access Control | News, how-tos, features, reviews, and videos
How ABM built a cohesive security program around zero trust
CISO Stephanie Franklin-Thomas advances ABM’s security program with a holistic approach to zero trust, putting equal emphasis on people, process, and technology.
Top cybersecurity products unveiled at Black Hat 2022
Here are some of the most interesting new products launched at Black Hat USA 2022, including zero trust, extended detection and response (XDR), and a host of other threat and vulnerability management offerings.
Axis adds automation, onboarding features to Atmos ZTNA network access software
Axis is also offering migration tools and a buyback program for those looking to move from legacy ZTNA (zero trust network access) applications.
Teleport features passwordless access with new access plane update
With the new capability, Teleport hopes to replace usernames, passwords, private keys, and other secrets with more secure physical identity solutions such as Touch ID, Windows Hello and Trusted Platform Module hardware.
Passwordless company claims to offer better password security solution
Stytch's business is getting rid of passwords so why is it trying to "modernize" their use?
Auth0’s OpenFGA explained: Open source universal authorization
Authorization is an essential and non-trivial need in application development. Modern requirements have only increased the complexity of delivering adequate authorization. Auth0 aims to make authorization more standard and...
Consulting firms jump on the Zero Trust bandwagon
Deloitte's new Zero Trust Access service and HCL's collaboration with Palo Alto Networks mark a sustained trend towards offering Zero Trust security services for clients.
How the US DHS develops hard-to-find cybersecurity skills
The Department of Homeland Security's Amanda Conley tells how she finds and uplevels specialized and expensive cybersecurity talent on a government budget.
6 signs your IAM strategy is failing, and how to fix it
Mistakes when implementing identity and access management systems, especially during upgrades, can have lasting effects. Here's how to spot and avoid the worst of them.
Mitek launches MiVIP platform to fight identity theft
The Mitek Verified Identity Platform can leverage multiple authentication technologies to provide security across the transaction lifecycle.
Cloud-native TACACS+ access solution launched by Portnox
New product aims to make network authentication, authorization, and accounting technology more attractive to mid-sized companies.
Web3 and IAM: Marching toward disruption
While the debate about Web3’s long-term relevance rages, the technology itself goes merrily on its way, finding ever more avenues of use. One area that is seeing interesting potential and actual developments is IAM.
Best practices for deploying multi-factor authentication on Microsoft networks
Microsoft will soon mandate MFA for some customers, and these are the key considerations before you deploy it.
SSO explained: Single sign-on definition, examples, and terminology
Single sign-on (SSO) is a user authentication service that allows a user to access multiple applications with one set of login credentials. Password fatigue, cloud sprawl and developer simplicity are pushing the rise of SSO.
SecureAuth unveils new end-to-end access and authentication solution
Orchestration, passwordless tech, continuous authentication combined in next-generation Arculix platform
7 top privileged access management tools
Good management of privileged credentials can stop or slow an attacker's movement through your network. These PAM tools are among the best.
7 machine identity management best practices
Managing machine identities can be just as important as managing human identities, especially in a zero-trust environment.
How SAML works and enables single sign-on
Security assertion markup language (SAML) is an open standard that defines how providers can offer both authentication and authorization services. Here's what you need to know.
NanoLock’s zero-trust cybersecurity suite to protect industrial machinery, production lines
Vendor claims to be the first to offer device-level protection solutions designed for legacy and new industrial machinery and smart factory production lines.