Security Concerns with Single Sign-On
The topic of Single Sign-On (SSO) has come up recently with more than one client, where the client was unsure about which services they already had compared with what their needs were. In the technology…
The topic of Single Sign-On (SSO) has come up recently with more than one client, where the client was unsure about which services they already had compared with what their needs were. In the technology…
Making a transition between software and business processes is always a daunting task. Identifying when a process should be modified and making the migration to a new process requires in-depth research and risk-benefit assessments. This…
Life is full of choices. We constantly gauge the cost of tradeoffs to evaluate if the benefits of our decisions will be worthwhile. That struggle even applies when choosing an IT governance solution. Not only…
Experts David Cline and Ryan Babbitt discuss how Zero Trust Security really means Identity Security and why IAM practices, like Multifactor Authentication, Identity Governance, and Privileged Access Management, play such a significant role in realizing…
A recent study by Microsoft found that multi-factor authentication alone stops 99.9% of automated attacks. Credential stuffing and phishing attacks are prevented by requiring more than a simple password to access an account. In today's…
When you’re looking for a platform to develop a custom web application the options are limitless. Oftentimes, one of the many varieties of java frameworks -- Spring, Struts, etc. -- come to mind as a…
If you work in security and access for a publicly-traded company, I can guess what time of year you dread the most...security audit time. It never fails, when you have a million other things that…
As a kid growing up in the ‘80s, I remember in elementary school a discussion predicting we would have flying cars by the time I was a grown-up. Almost four decades later, no flying cars,…
In recent months, the workplace landscape has witnessed a drastic change. With an increasing amount of remote workers, data breaches are on the rise and system safeguards are now more essential than ever. Reports state…
Choosing new software is never easy. Coming up with selection criteria means that you need to understand your company’s needs and strengths. What questions should you ask to determine which identity governance tool is right…