Last week, my blog focused on Microsoft’s push to make everything as a service a reality. One issue that reality would expose is people and companies putting much sensitive data in the cloud, for ...
Since the beginning of distributed personal computer networks, one of the toughest computer security nuts to crack has been to provide a seamless, single sign-on (SSO) access experience among multiple ...
What is SAML and what is it used for? The Security Assertion Markup Language (SAML) is an open standard that allows security credentials to be shared by multiple computers across a network. It ...
If you want to keep your online accounts safe, adding two-factor authentication (2FA) is the single most important step you can take. While no security measure is 100 percent hackproof, 2FA is going ...
Certificate-based authentication is a cryptographic technique that allows one computer to securely identify itself to another across a network connection, using a document called a public-key ...
Forbes contributors publish independent expert analyses and insights. I write about contemporary cybersecurity and online privacy issues. Before talking about what authentication is and how it works, ...
How to get users on board with two-factor authentication Your email has been sent Having trouble convincing employees in your organization to use two-factor authentication? Here's a guide on how to ...
If you haven’t seen your data exposed in a major data breach within the last five years alone, you haven’t been paying attention. Billions of people worldwide have lost their data many times over. 26 ...
Phishing takes advantage of the weakest link in any organization’s cybersecurity system — human behavior. Phishing attacks are generally launched via email, although some opening salvos have begun ...
Albert Pujols made history on Thursday, when he swung at a fat pitch and flipped his bat and joined Hank Aaron and Alex Rodriguez as only the third player in baseball history with 2,000 RBIs. But the ...