- Showing:
- All Topics
Security | Science & Technology
Science & Technology | Security
Smooth Surface SAML Single Sign-On -
Under the surface, SAML Single Sign-on's webbed feet are paddling like crazy to complete the SAML algorithm that performs secure and seamless transitions
Science & Technology | Security
Transparent Ally Part 2: Transparent Authentication -
Contextual authentication has been around for years, but is finally starting to gain traction. It seeks to leverage extra information the computer can use
Science & Technology | Security
SAML SSO Neck Tie -
The masses will be happy to be free of so many passwords, but as more users and resources are added to the system . . . Learn more about SAML SSO
Science & Technology | Security
Obama Initiates BuySecure: YOU Can Help Defeat Cyber Attacks -
President Obama took a minute to thank businesses of all sizes that are making an effort to defeat cyber attacks. “I want to thank all the business leaders
Science & Technology | Security
The Age of Self Reliance: Self-service Password Reset -
The Age of Self Reliance: Self-service. I think it goes without saying that most of us would want to be known as self-reliant. Not the kind of self-reliant
Science & Technology | Security
Passwords: The Frequent Nightmare (SAML Single sign-on) -
Are you exhausted of having to remember all of your passwords and which password goes with each account? The SAML Single Sign-on tech brief expounds on . . .
Science & Technology | Security
Snapchat Takes a Hit -
Snapchat has claimed that it has not been breached, but rather a third party app, snapsaved.com, had fallen victim of this data breach. Snapsaved.com . . .
Science & Technology | Security
Silent Authentication: Transparent Ally Part 1 -
Silent Authentication: to better understand a computer’s disadvantages, let’s start eliminating the advantages you have as a human . . .
Science & Technology | Security
A Call to Arms: Second Factor Authentication -
By logging in with this second factor authentication (2FA), they limit not only their vulnerability but that of the Kingdom! But you are wise, brave hero
Science & Technology | Security
Is the Cost of 2FA Too High? Two-factor Authentication Methods -
Two-factor Authentication Methods: there's no need to spend hundreds of thousands of dollars to protect your environment with 2FA, like RSA’s SecurID.
Science & Technology | Security
Is the Cost of 2FA Too High? Two-factor Authentication Methods -
Two-factor Authentication Methods: there's no need to spend hundreds of thousands of dollars to protect your environment with 2FA, like RSA’s SecurID.
Science & Technology | Security
A Call to Arms: Single Sign-On -
Achievement unlocked IT Hero! You have successfully completed the first . . . By fortifying the castle gates with an Single Sign-on solution, you allow your end users
Science & Technology | Security
Two Factor Auth List
List of sites with Two Factor Auth support which includes SMS, email, phone calls, hardware, and software.
Science & Technology | Security
Two-factor, single sign-on, and password reset User Authentication
The PortalGuard software is an authentication solution-set which is focused on enhancing usability, while maintaining a balance between security, auditing, and compliance for your web and desktop authentication requirements. PortalGuard provides capabilit