The most common way cyber-criminal hackers break into enterprise networks is by stealing or guessing usernames and passwords. The attacks, whether the goal is stealing information, executing a ...
As organizations expand remotely and to the cloud, the need for authentication that reaches all corners of a growing network – without incurring security burnout – is necessary to balance productivity ...
Imprivata normally would be featured in the Identity Management newsletter (and often is, for that matter) but its latest release is aimed squarely at the Windows networking market so I’d thought I’d ...
Regular readers will know that I’m a big fan of context-based access. I like the idea of gathering as much context information as possible and using it for authentication and authorization as well as ...
Virtual private networks have shortcomings when it comes to protecting remote network connections. These technologies can replace or supplement them. Once the staple for securing employees working ...
It has long been known that passwords are one of the weakest methods for authenticating users. One of the first examples of a password being compromised can be traced back to 413 BCE, when the Greek ...