Single Sign-On (SSO) 101
Here we dive in to the basics of secure single sign-on (SSO): how it works, the benefits of using it, and how you can begin the process of deploying SSO.
The latest information security news - what's happening now, what's important, why it matters, real-world implications and who it matters to - without any of the overhype.
420 Articles Found
Here we dive in to the basics of secure single sign-on (SSO): how it works, the benefits of using it, and how you can begin the process of deploying SSO.
For federal agencies, compliance laws, policies and standards are often so confusing that they use specialized consultants to determine whether a desired IT initiative will result in compliance issues. Here, we’ll help you cut through the confusion and outline some of the key compliance regulations federal agencies must follow.
Two-factor authentication (2FA) is one of the most important authentication tools. Learn what it is, why it's essential, how it works, and how to get started.
It would be pretty cool if we had a framework available to us that validated a user’s identity, validated the machine they were using, and applied some policy and context for everything they tried to access. A model that would move the perimeter to anywhere an access decision is made. Oh, wait, we do. It’s often referred to as zero trust.
The Department of Homeland Security (DHS) made a curious announcement during the shutdown that had everyone scratching their collective heads ... at first. DHS gave agencies 10 days to get their account security in order, specifically calling out two-factor authentication (2FA) and other protections due to DNS hijacking vulnerabilities.