Access Control

5 identity management startups grabbing attention — and funding

The global identity management system market is growing at an astounding rate. These five startups are vying for a piece…

1 month ago

It’s not just you: Avoiding third-party security vulnerabilities

Even a robust security strategy may leave an opening for attackers: Third-party security vulnerabilities are not often considered, but they…

2 months ago

Google introduces Adiantum encryption for Android devices

If AES encryption is not supported by your Android device, Google’s new Adiantum encryption may be your best bet to…

3 months ago

Rethinking how we authenticate: Continuous authentication for continuous security

Traditional ways of authentication no longer ensure effective security. For sufficient security at home and at work, continuous authentication is…

3 months ago

Give it the finger: Pushing back against biometric authentication

Biometric authentication is becoming a fact of life in governments and in the commercial sector. But many say this is…

3 months ago

DHS issues emergency directive about DNS hijacking attacks

The Department of Homeland Security has raised an alert about an influx of DNS hijacking and described countermeasures for federal…

4 months ago

Review of Specops Password Policy

Specops Password Policy is a tool for enforcing the use of strong and secure passwords. Here’s our review of this…

4 months ago

Specops uReset Review

Specops uReset is a self-service password reset solution that lets users reset passwords in the same secure way as login…

4 months ago

Want to pump up your IT security? Strengthen your account management practices

If your company doesn't get a good handle on its account management practices, your IT security will suffer as a…

11 months ago

Song remains the same: FBI gunning for encryption backdoor

The FBI has a new director, but it is singing the same old song. The bureau wants an encryption backdoor…

1 year ago