Authentication

Authentication | News, how-tos, features, reviews, and videos

Composite image of binary code and biometric fingerprint scanning authorization.
CSO  >  Digital identity  >  personal identity / recognition + access authentication / personal data

office 365 disable single authentication password by rayalhristova betty

How to disable basic authentication in Microsoft Office 365

If you've implemented multi-factor authentication, you should disable the default basic authentication to make sure attackers can't exploit it.

CSO > Password elimination [conceptual password security lock in a trash bin]

How First Citrus Bank got rid of employee passwords

The Florida bank rolled out passwordless authentication in February that relies on device biometrics of their smartphones.

file sharing / data sync / shared records / eliminating redundancy of multiple identities

Can the re-use of identity data be a silver bullet for industry?

The ability to re-use identity data for individuals across different systems would greatly simplify authentication. Here's what it would take to make it happen.

6 gotta know ipassword tips reveal password with large type 6

What should your company’s change password policy be?

Microsoft's recent dropping of its maximum password age default renews the debate over forced password changes. Here's why you should continue to expire passwords.

Hands write on paper with pen.

FINRA Rule 4512: U.S. SEC approves electronic signatures

The updated FINRA Rule 4512(a)(3) is now in effect, striking a blow against outdated regulations.

2fa sms

Why unauthenticated SMS is a security risk

Multifactor authentication that uses SMS messaging as a second factor is vulnerable to simple hacks. User education is the best defense.

06 permission

Check your access control permissions before hackers do

Every organization has devices, networks or cloud services with improperly configured permissions that expose sensitive data or could allow hackers to gain privileged access. Check them now.

hot and cold fire and ice clash temperature

7 hot cybersecurity trends (and 4 going cold)

Is that security trend hot or not? From tools and technologies to threats, tactics, and training, the numbers don't lie.

9 screen locking device lock down authentication

How to hack a smartcard to gain privileged access

Using smartcards in a Microsoft Active Directory environment makes them vulnerable to this privilege escalation attack.

login password - user permissions - administrative control

How to protect against poor Windows password practices

Employees will reuse passwords for work systems for their personal online accounts. Here's how to set up multifactor authentication in a Windows environment to reduce the risk of password compromise.

5 password best practices unique passwords authentication

The best password advice right now (Hint: It's not the NIST guidelines)

Short and crackable vs. long, complex and prone to reuse? The password debate rages on, but this columnist has a change of mind.

security display showing  biometric processing

What is biometrics? 10 physical and behavioral identifiers that can be used for authentication

Biometrics are physical or behavioral human characteristics to that can be used to digitally identify a person to grant access to systems, devices or data. It has the potential to make authentication dramatically faster, easier and...

9 screen locking device lock down authentication

Power LogOn offers 2FA and networked password management for the enterprise

This authentication tool is simple to set up and use, but the biggest selling point might be workable password management across the enterprise.

5 password best practices unique passwords authentication

12 famous passwords used through the ages

Passwords seem like a recent thing, but they've been in use for a long time. Here are a dozen of the more memorable ones.

women group colorful crowd diversity

Women in identity management: 4 newcomers to watch

Identity management veterans Diana Volere, Diane Joyce, Eve Maler and Susan Morrow introduce you to new entrants in the field.

fingerprint scan biometric security system

6 reasons biometrics are bad authenticators (and 1 acceptable use)

Biometrics-only authentication is inaccurate, hackable and far from foolproof.

secure two-step authentication via laptop and mobile phone

How to set up multifactor authentication for Office 365 users

Requiring MFA for some or all Microsoft Office 365 users will better protect your network and email system from attacks.

login password - user permissions - administrative control

Using a password manager: 7 pros and cons

This veteran security pro feels more secure now that he's using a password manager, but there are still risks.

Load More