Authentication | News, how-tos, features, reviews, and videos

login password - user permissions - administrative control
Facebook / privacy / security / breach / wide-eyed fear


What is single sign-on? How SSO improves security and the user experience

Password fatigue, cloud sprawl and developer simplicity are pushing the rise of SSO.

woman phone scam

4 scams that illustrate the one-way authentication problem

These scams rely on tricking consumers into believing they are interacting with a trusted vendor. Here’s how vendors can prevent the scams.

user authentication

How to evaluate web authentication methods

Authentication evaluation white paper includes popular and obscure methods and outlines a framework for assessing their security effectiveness.

continuous authentication

What is access control? 5 enforcement challenges security professionals need to know

Access controls authenticate and authorize individuals to access the information they are allowed to see and use.

keys authentication

What is two-factor authentication (2FA)? How to enable it and why you should

With Google, Facebook, Instagram, or your own internal accounts, 2FA provides an extra layer of protection that helps keep hackers out.


What is SAML, what is it used for and how does it work?

The Security Assertion Markup Language (SAML) standard defines how providers can offer both authentication and authorization services. Here's what you need to know.

Salted Hash

The Equifax breach, incident response and the future of passwords | Salted Hash Ep 2

So much of security comes down to 4 little words: Keep it simple, stupid. CSO’s Steve Ragan and Fahmida Rashid explain why there’s no magical mystery cure for ransomware. Also, how much is data from the Equifax breach worth? (Hint:...

2 token authentication locks

What is the biggest threat from the Equifax breach? Account takeovers

Cyber criminals have the most to gain by taking ownership of bank, brokerage and retirement accounts using people’s PII. Are traditional authentication systems obsolete?

keys to access solutions admission movie ticket

What is OAuth? How the open authorization framework works

OAuth allows websites and services to share assets among users. It is widely accepted, but be aware of its vulnerabilities.

cloud security

Google tries to beat AWS at cloud security

New tools that protect enterprise applications running on Google Cloud Platform may help take the spotlight away from AWS and Microsoft Azure

Load More