Authentication

Authentication | News, how-tos, features, reviews, and videos

abstract face / digital identity
digital circuit-board key amid binary code / hardware key

binary eye circuits

Authentication, identity management start-ups lead 2019 VC investing

Cybersecurity venture investments reached nearly $7 billion in 2019. Authentication and identity management start-ups were the top lures.

login credential - user name, password - administrative controls - access control - single sign-on

Do you trust your admins? 5 tips to manage administrator access

The access rights that internal and external network admins possess carry the potential for abuse and errors that can expose systems and data. These practices can help avoid that.

A business man touches a futuristic lock + circuit board security interface.

5 standout products from RSA 2020

2020 will be remembered as the year the human element finally came to security.

CSO > Password elimination [conceptual password security lock in a trash bin]

The 25 worst passwords of 2019, and 8 tips for improving password security

Blacklist these 25 passwords now and use these tips to improve enterprise password security.

digital identity / authentication

What's ahead for digital identity in 2020?

Events of the past year have set up big changes for digital identity in 2020. Here's recap of what happened and what to expect this year.

Windows logo / life preserver / rescue / recovery / fix / resolve / solution

How to fix insecure LDAP binds to prevent exposed Windows admin credentials

Although Microsoft has a permanent fix on the way, it's possible that you're exposing domain admin account credentials in cleartext. Here's how to check for and solve that problem.

access control / authentication / privileges / security

Two tips to make multifactor authentication for Office 365 more effective

Here's how to set up "break glass" accounts for emergency admin access to Microsoft Office 365 and brand your Office 365 log-in page to foil fake pages.

Digitizing stylus input via tablet  >  writing / drawing / signatures

NHTSA odometer disclosure rule might pave way for e-signature authentication

The Final Rule allows flexibility in the technology they use to digitally verify identity through electronic signatures, including a pen pad or biometrics.

Virgin Hyperloop One X-1 pod

How Virgin Hyperloop One protects its most precious data

VHO's high profile means its intellectual property is coveted by competitors, nation-states and curious hackers. Tightly controlled access is the key to protecting that data.

silver platter passwords exposed authentication hacked vulnerable security breach

4 authentication use cases: Which protocol to use?

Choosing the wrong authentication protocol could undermine security and limit future expansion. These are the recommended protocols for common use cases.

access management / access control / user connections / identities

Flex streamlines app access for 20k suppliers with IAM overhaul

Contract manufacturer Flex dumped its distributed identity and access management system for a more centralized, cloud-based option that better protects data and intellectual property.

A businessman interacts with a Microsoft-colored shield protecting network users + user groups.

How to audit permissions after a Windows migration

As companies move off Windows 7 and Server 2008, they run the risk of leaving dangerous access permissions behind. Here's how to find them.

A binary mask.

Deepfakes and synthetic identity: More reasons to worry about identity theft

How can we maintain control over digital identity In a world where it is being blurred and abused by fraudsters?

Admission tickets in an digital network / access / admittance / authorization / authentication

What is OAuth? How the open authorization framework works

OAuth is an open-standard authorization protocol or framework that describes how unrelated servers and services can safely allow authenticated access to their assets. It is widely accepted, but be aware of its vulnerabilities.

Credential theft  > A thief steals a password.

How to detect and halt credential theft via Windows WDigest

Attackers can steal user credentials by enabling credential caching in the Windows authentication protocol WDigest. Here's how to stop them.

Multi-factor authentication (MFA) / two-factor authentication (2FA) / one-time security code

2fa explained: How to enable it and how it works

Two-factor authentication (2fa) is a method of establishing access to an online account or computer system that requires the user to provide two different types of information. It can boost security for anyone using any kind of online...

'NO' symbol [circle-backslash] and raised hand against a background of passwords / passcodes

How to disable legacy authentication in Microsoft Exchange to enable MFA

Microsoft recommends enabling multi-factor authentication for Office 365. To do so, you must also disable basic or legacy authentication on Microsoft Exchange Server.

black hat / hacker / spotlight / binary overlay

4 takeaways from Black Hat 2019

Experts identified new trends and warned of emerging or growing threats, including security's impact on software development and the growing threat social media poses.

Load More