Access Control
Access Control | News, how-tos, features, reviews, and videos
COVID-19 offers a unique opportunity to pilot zero trust, rapidly and at scale
A zero-trust model addresses many of the security concerns around supporting large numbers of remote workers, and new vendor free trials make fast deployment possible.
4 key problems with digital identity and why we need a new approach
To more accurately and more safely authenticate people online, digital identity needs to better cope with changes in people's lives. It's time to build identity technology for a digital life.
The 10 most powerful cybersecurity companies
What makes these 10 security vendors the biggest power players? We break it down.
Making the case for hardware 2FA in the enterprise
Hardware 2FA tokens are the best and cheapest defense against phishing and credential stuffing attacks, but there are some gotchas.
Authentication, identity management start-ups lead 2019 VC investing
Cybersecurity venture investments reached nearly $7 billion in 2019. Authentication and identity management start-ups were the top lures.
Do you trust your admins? 5 tips to manage administrator access
The access rights that internal and external network admins possess carry the potential for abuse and errors that can expose systems and data. These practices can help avoid that.
5 standout products from RSA 2020
2020 will be remembered as the year the human element finally came to security.
The 25 worst passwords of 2019, and 8 tips for improving password security
Blacklist these 25 passwords now and use these tips to improve enterprise password security.
3 reasons you can’t fight facial recognition
The biometric backlash is but a brief blip. Resistance is futile. You WILL be identified. But is that good or bad?
What's ahead for digital identity in 2020?
Events of the past year have set up big changes for digital identity in 2020. Here's recap of what happened and what to expect this year.
How to fix insecure LDAP binds to prevent exposed Windows admin credentials
Although Microsoft has a permanent fix on the way, it's possible that you're exposing domain admin account credentials in cleartext. Here's how to check for and solve that problem.
Two tips to make multifactor authentication for Office 365 more effective
Here's how to set up "break glass" accounts for emergency admin access to Microsoft Office 365 and brand your Office 365 log-in page to foil fake pages.
NHTSA odometer disclosure rule might pave way for e-signature authentication
The Final Rule allows flexibility in the technology they use to digitally verify identity through electronic signatures, including a pen pad or biometrics.
How Virgin Hyperloop One protects its most precious data
VHO's high profile means its intellectual property is coveted by competitors, nation-states and curious hackers. Tightly controlled access is the key to protecting that data.
4 authentication use cases: Which protocol to use?
Choosing the wrong authentication protocol could undermine security and limit future expansion. These are the recommended protocols for common use cases.
Flex streamlines app access for 20k suppliers with IAM overhaul
Contract manufacturer Flex dumped its distributed identity and access management system for a more centralized, cloud-based option that better protects data and intellectual property.
Peer product reviews: IT pros evaluate 7 enterprises offerings
These downloadable reports offer objective user-contributed product evaluations to help IT decision-makers navigate the tech purchase process.
Twitter spy scandal a wake-up call for companies to clean up their data access acts
Two Twitter employees accessed user data on behalf of the Saudi government. Neither should have had access, and this is a sign of a bigger problem at all companies.
Credential stuffing explained: How to prevent, detect and defend against it
The automated use of breached usernames and passwords to access accounts is low risk, high reward for cybercriminals. Here's how to make it harder for them to use credential stuffing.
How to audit permissions after a Windows migration
As companies move off Windows 7 and Server 2008, they run the risk of leaving dangerous access permissions behind. Here's how to find them.
-
Video/Webcast
Sponsored -
eBook
Sponsored -
White Paper
-
Video/Webcast
Sponsored