Authentication
Authentication | News, how-tos, features, reviews, and videos
Best practices for deploying multi-factor authentication on Microsoft networks
Microsoft will soon mandate MFA for some customers, and these are the key considerations before you deploy it.
SSO explained: Single sign-on definition, examples, and terminology
Single sign-on (SSO) is a user authentication service that allows a user to access multiple applications with one set of login credentials. Password fatigue, cloud sprawl and developer simplicity are pushing the rise of SSO.
SecureAuth unveils new end-to-end access and authentication solution
Orchestration, passwordless tech, continuous authentication combined in next-generation Arculix platform
7 top privileged access management tools
Good management of privileged credentials can stop or slow an attacker's movement through your network. These PAM tools are among the best.
7 machine identity management best practices
Managing machine identities can be just as important as managing human identities, especially in a zero-trust environment.
How SAML works and enables single sign-on
Security assertion markup language (SAML) is an open standard that defines how providers can offer both authentication and authorization services. Here's what you need to know.
Open-source standard aims to unify incompatible cloud identity systems
The project uses open source tech and a new common policy format to manage identity access policies across multi-clouds, on-premises systems, and vendors.
Apple, Google, Microsoft expand support for FIDO passwordless sign-in standard
The tech giants commit to expanded support for FIDO passwordless standard that the firms say will allow faster, easier and more secure sign-ins across leading devices and platforms.
GitHub to mandate 2FA for all code contributors by 2023
The world’s largest development platform will require all code-contributing users to enroll in two-factor authentication by the end of 2023 to enhance software supply chain security.
10 most common MFA excuses, and how to answer them
CISOs often meet resistance to multi-factor authentication from users, management, and even IT. Here's how to counter their complaints.
GitHub repositories compromised by stolen OAuth tokens
GitHub, Salesforce warn of data theft from private code repositories.
It's time to re-evaluate your 2FA setup on Microsoft networks
Attackers are exploiting some 2FA settings to gain network access. Does your current configuration provide the best protection?
Why authentication is still the CISO’s biggest headache
Authenticate continues to vex security leaders as businesses become more digitized, agile and dependent on remote employees.
4 ways attackers target humans to gain network access
These are some of the favorite ways cybercriminals try to get around an organization's cyber defenses to steal credentials or commit fraud.
FIDO enters the consumer identity space
As remote work blurs the line between enterprise and consumer IT, can FIDO finally fix the security usability conundrum of consumer authentication?
Clearview AI commercialization of facial recognition raises concerns, risks
Facial recognition as a service has caught the attention of regulators and litigators. CISOs at companies considering the technology need strong privacy protections in place.
12 risk-based authentication tools compared
Risk-based authentication tools have become more sophisticated and popular as companies transition away from dependence on password protection.
3 authentication-level protections for remote users and devices
Egress filtering, conditional access rules, and free tools from governments can help identify suspicious activity and protect credentials.