Multi-Factor Authentication Made Simple for Legacy and Custom Apps

Looking for an easier way to add multi-factor authentication (MFA) to legacy and custom applications? Look to a next-generation firewall and MFA integration to enforce it at the network layer ...
Diving into Summer Vacation Security Risks

Diving into Summer Vacation Security Risks

We are in the middle of the holiday season, and while it may be the most enjoyable part of the year, it’s definitely not the safest. We all take our technology gear ...

DDoS attacks grow more popular, targeted

A new State of the Internet/Security: Web Attack report finds the number of distributed denial of service attacks to be growing, already up 16 percent over all of last year. The report ...

Realize the Significant Business Value of Identity Governance

For executive leadership it is becoming even more important to translate technology success into its value to the business. Read this blog to learn new ways you can show Identity Governance is ...
What is AWS Cloud Directory?

What is AWS® Cloud Directory?

If you’re feeling slightly confused about the new offering from Amazon Web Services (AWS®) in the cloud directory space, it’s completely understandable. The term “cloud directory” meant one thing in the past, ...
Zero Trust Architecture

Zero Trust Architecture

The concept of a zero trust architecture in today’s IT environment is steadily gaining traction. Reports of security breaches are a near-everyday occurrence, so it only makes sense that IT admins would ...
Type Juggling Authentication Bypass Vulnerability in CMS Made Simple

Type Juggling Authentication Bypass Vulnerability in CMS Made Simple

Have you ever experienced that sinking feeling when you discover that you've run out of one crucial ingredient for a special meal? It might be a single ingredient, but it ruins the ...
Future Without Passwords

Moving Slowly Toward a Future Without Passwords

It seems like every week brings some sort of new password-related frustration. Usually it involves a data breach of some website where passwords weren’t encrypted and are now compromised. But there are ...
Security Boulevard
AWS® Cloud Server Authentication Microservice

AWS® Cloud Server Authentication Microservice

Amazon Web Services (AWS®) has been adept at providing all kinds of different microservices for IT, development, and DevOps organizations. Considering the microservice market, the concept of authentication as a microservice has ...

Multi-Factor Authentication for Your VPN: 3 Keys to Getting It Right

How many multi-factor authentication solutions does it take to secure VPN access today? Just one, if it?s the right kind of solution. Here?s what you need in today?s access environment to ensure ...
Loading...