Authentication

Authentication | News, how-tos, features, reviews, and videos

Impersonation / disguise / fraud / false identity / identity theft
access control / authentication / privileges / security / key

Multifactor authentication  >  Mobile phone verification of a permission request for laptop login.

Best practices for deploying multi-factor authentication on Microsoft networks

Microsoft will soon mandate MFA for some customers, and these are the key considerations before you deploy it.

User ID + password / credentials / authentication

SSO explained: Single sign-on definition, examples, and terminology

Single sign-on (SSO) is a user authentication service that allows a user to access multiple applications with one set of login credentials. Password fatigue, cloud sprawl and developer simplicity are pushing the rise of SSO.

access control / authentication / privileges / security / key

SecureAuth unveils new end-to-end access and authentication solution

Orchestration, passwordless tech, continuous authentication combined in next-generation Arculix platform

access control / authentication / privileges / security

7 top privileged access management tools

Good management of privileged credentials can stop or slow an attacker's movement through your network. These PAM tools are among the best.

Automation/machine learning/artificial intelligence >  mind-gears within circuit-board silhouette

7 machine identity management best practices

Managing machine identities can be just as important as managing human identities, especially in a zero-trust environment.

authentication

How SAML works and enables single sign-on

Security assertion markup language (SAML) is an open standard that defines how providers can offer both authentication and authorization services. Here's what you need to know.

digital identity / authentication

Open-source standard aims to unify incompatible cloud identity systems

The project uses open source tech and a new common policy format to manage identity access policies across multi-clouds, on-premises systems, and vendors.

digital identity / authentication

Apple, Google, Microsoft expand support for FIDO passwordless sign-in standard

The tech giants commit to expanded support for FIDO passwordless standard that the firms say will allow faster, easier and more secure sign-ins across leading devices and platforms.

Multi-factor authentication (MFA) / two-factor authentication (2FA) / one-time security code

GitHub to mandate 2FA for all code contributors by 2023

The world’s largest development platform will require all code-contributing users to enroll in two-factor authentication by the end of 2023 to enhance software supply chain security.

Multifactor authentication  >  A mobile phone displays a digital key to a lock on a user's laptop.

10 most common MFA excuses, and how to answer them

CISOs often meet resistance to multi-factor authentication from users, management, and even IT. Here's how to counter their complaints.

close up of hands on a computer keyboard coding programming software picture id1205339069

GitHub repositories compromised by stolen OAuth tokens

GitHub, Salesforce warn of data theft from private code repositories.

Multi-factor authentication (MFA) / two-factor authentication (2FA) / one-time security code

It's time to re-evaluate your 2FA setup on Microsoft networks

Attackers are exploiting some 2FA settings to gain network access. Does your current configuration provide the best protection?

digital identity / authentication

Why authentication is still the CISO’s biggest headache

Authenticate continues to vex security leaders as businesses become more digitized, agile and dependent on remote employees.

One avatar is uniquely identified among others at the center of a target in a digital environment.

4 ways attackers target humans to gain network access

These are some of the favorite ways cybercriminals try to get around an organization's cyber defenses to steal credentials or commit fraud.

Multifactor authentication  >  Mobile phone verification of a permission request for laptop login.

FIDO enters the consumer identity space

As remote work blurs the line between enterprise and consumer IT, can FIDO finally fix the security usability conundrum of consumer authentication?

facial recognition technology

Clearview AI commercialization of facial recognition raises concerns, risks

Facial recognition as a service has caught the attention of regulators and litigators. CISOs at companies considering the technology need strong privacy protections in place.

access control / authentication / privileges / security

12 risk-based authentication tools compared

Risk-based authentication tools have become more sophisticated and popular as companies transition away from dependence on password protection.

A conceptual representation of accessing username and password credentials.

3 authentication-level protections for remote users and devices

Egress filtering, conditional access rules, and free tools from governments can help identify suspicious activity and protect credentials.

Load More
You Might Also Like