Be Suspicious: Living in a Post-Perimeter World

Be Suspicious: Living in a Post-Perimeter World

We must change the way we think about security as technology and the way people use it has changed - by Tim Brown, VP of Security, SolarWinds MSP ...
How To Build An Authentication Platform

How To Build An Authentication Platform

Today's authentication requirements go way beyond hooking into a database or directory and challenging every user and service for an Id and password. Authentication and the login experience, is the application entry ...
Two-factor Authentication Is Not Dead

Two-factor Authentication Is Not Dead

I’ve had just about enough of the fear mongering and lazy ‘reporting’ that’s been in the press recently around how two-factor authentication is broken. I’m not sure about you, but the way ...
EH-Net - Kron - Security Assumptions

Security Assumptions – Don’t Make an ASS of U and ME

Have you ever stopped to ask yourself if the things you are defending against are really your biggest security problems? I am going to challenge you to think about things a little ...
Simplifying Security in the Cloud

Simplifying Security in the Cloud

In nearly every conversation I have with clients about “the cloud” and their business, the No. 1 trepidation for further migration to the cloud is concerns around security. For many years this ...
Security Boulevard

Multi-Factor Authentication, New Attacks on 4G and 5G Mobile Networks

This is your Shared Security Weekly Blaze for March 4th 2019 with your host, Tom Eston. In this week’s episode: Multi-factor authentication to protect your credentials, and new attacks on 4G and ...
How to Eliminate Profile Fraud

MFA: How to Eliminate Profile Fraud and Win the Fight for Consumer Trust

Social media sites are fraught with fake accounts and imposter profiles aimed at scamming money from innocent users or promoting fake products in support of illegal businesses. These fake accounts, on Facebook ...
Security Boulevard
Why Identity Security Matters

Why Identity Security Matters

Many executives and business owners haven’t really spent much time thinking about identity security within their organizations. It makes sense because they have so many other, more pressing matters to think about, ...
Rey is in the Ahch-To Pit looking at a broken mirror.

Cave of Broken Mirrors: 3 Issues with AWS Cognito

Secure Ideas is currently working on a revamp and redesign of our website and client portal, to promote a better user experience for our clients. Since a lot of our infrastructure is ...
An Overview of Yubikey Two Factor Authentication

An Overview of Yubikey Two Factor Authentication

The password is arguably the most popular and most common security measure available and yet can be the most vulnerable if not managed securely. Passwords, for example, do not provide a reliable ...
Loading...