Access Control

Access Control | News, how-tos, features, reviews, and videos

stephanie franklin thomas 1200x800

How ABM built a cohesive security program around zero trust

CISO Stephanie Franklin-Thomas advances ABM’s security program with a holistic approach to zero trust, putting equal emphasis on people, process, and technology.

Zero-trust

What is zk-SNARK?

An intro to the most popular zero-knowledge protocol

Top cybersecurity products unveiled at Black Hat 2022

Here are some of the most interesting new products launched at Black Hat USA 2022, including zero trust, extended detection and response (XDR), and a host of other threat and vulnerability management offerings.

zero trust

Axis adds automation, onboarding features to Atmos ZTNA network access software

Axis is also offering migration tools and a buyback program for those looking to move from legacy ZTNA (zero trust network access) applications.

cso security access granted breach hack identity theft gettyimages 1191670668 by reklamlar 2400x160

Teleport features passwordless access with new access plane update

With the new capability, Teleport hopes to replace usernames, passwords, private keys, and other secrets with more secure physical identity solutions such as Touch ID, Windows Hello and Trusted Platform Module hardware.

Conceptual image of a password amid hexadecimal code.

Passwordless company claims to offer better password security solution

Stytch's business is getting rid of passwords so why is it trying to "modernize" their use?

Admission tickets in an digital network / access / admittance / authorization / authentication

Auth0’s OpenFGA explained: Open source universal authorization

Authorization is an essential and non-trivial need in application development. Modern requirements have only increased the complexity of delivering adequate authorization. Auth0 aims to make authorization more standard and...

Consulting firms jump on the Zero Trust bandwagon

Deloitte's new Zero Trust Access service and HCL's collaboration with Palo Alto Networks mark a sustained trend towards offering Zero Trust security services for clients.

dhs amanda conley 3x2

How the US DHS develops hard-to-find cybersecurity skills

The Department of Homeland Security's Amanda Conley tells how she finds and uplevels specialized and expensive cybersecurity talent on a government budget.

One avatar is uniquely identified among others at the center of a bullseye in a digital environment.

6 signs your IAM strategy is failing, and how to fix it

Mistakes when implementing identity and access management systems, especially during upgrades, can have lasting effects. Here's how to spot and avoid the worst of them.

Impersonation / disguise / fraud / false identity / identity theft

Mitek launches MiVIP platform to fight identity theft

The Mitek Verified Identity Platform can leverage multiple authentication technologies to provide security across the transaction lifecycle.

access control / authentication / privileges / security / key

Cloud-native TACACS+ access solution launched by Portnox

New product aims to make network authentication, authorization, and accounting technology more attractive to mid-sized companies.

access management / access control / user connections / identities

Web3 and IAM: Marching toward disruption

While the debate about Web3’s long-term relevance rages, the technology itself goes merrily on its way, finding ever more avenues of use. One area that is seeing interesting potential and actual developments is IAM.

Multifactor authentication  >  Mobile phone verification of a permission request for laptop login.

Best practices for deploying multi-factor authentication on Microsoft networks

Microsoft will soon mandate MFA for some customers, and these are the key considerations before you deploy it.

User ID + password / credentials / authentication

SSO explained: Single sign-on definition, examples, and terminology

Single sign-on (SSO) is a user authentication service that allows a user to access multiple applications with one set of login credentials. Password fatigue, cloud sprawl and developer simplicity are pushing the rise of SSO.

access control / authentication / privileges / security / key

SecureAuth unveils new end-to-end access and authentication solution

Orchestration, passwordless tech, continuous authentication combined in next-generation Arculix platform

access control / authentication / privileges / security

7 top privileged access management tools

Good management of privileged credentials can stop or slow an attacker's movement through your network. These PAM tools are among the best.

Automation/machine learning/artificial intelligence >  mind-gears within circuit-board silhouette

7 machine identity management best practices

Managing machine identities can be just as important as managing human identities, especially in a zero-trust environment.

authentication

How SAML works and enables single sign-on

Security assertion markup language (SAML) is an open standard that defines how providers can offer both authentication and authorization services. Here's what you need to know.

Industry 4.0 / Industrial IoT / Smart Factory / robotics / automation

NanoLock’s zero-trust cybersecurity suite to protect industrial machinery, production lines

Vendor claims to be the first to offer device-level protection solutions designed for legacy and new industrial machinery and smart factory production lines.

Load More
You Might Also Like