• How 2FA security bolsters user authentication

    IT pros can limit their exposure by solidifying user authentication. One popular option is to implement two-factor authentication, or 2FA, security on logins.

    rhsheldon485 pointsBadges:
  • CISSP Essentials training: Domain 9, Physical (Environmental) Security

    Prepare for the CISSP exam with this special training series on Domain 9, Physical (Environmental) Security.

    ITKE352,565 pointsBadges:
  • Avoid software defects by testing code

    To prevent software defects, test the code. But before you do, question every assumption behind the software. No question is too trivial to raise.

    jdjlent410 pointsBadges:
  • Apple’s iOS configuration profiles offer basic iPhone, iPad management

    While iOS configuration profiles may not be a long term device management answer, for now they provide IT plenty of utility when managing Apple devices.

    Craig Mathias800 pointsBadges:
  • identity management (ID management)

    Identity management (ID management) is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established...

    ITKE352,565 pointsBadges:
  • Security Implications & the Internet of Things (IoT)

    Amid the confusion and hype of catchphrases such as Big Data and the Internet of Things, two undeniable facts in this mix are: 1) the exponential growth in the volume of data, and 2) the impending inter-connectivity of many devices. With this in mind, how do we address security both within the...

    John168815 pointsBadges:
  • Why mobile user authentication is more important than ever

    Encrypting data is a good first step, but if you don't properly authenticate users, sensitive information can still fall into the wrong hands.

    Craig Mathias800 pointsBadges:
  • The key to assigning risk values in an IT security risk assessment

    Security expert Michael Cobb offers pointers on how to assign risk values during a security risk assessment.

    searchsecurity21,410 pointsBadges:
  • Spear phishing attack led to ICANN compromise

    Attackers used spear phishing emails to swipe credentials from several ICANN staff members and accessed the non-profit organization's systems.

    Brandan1,115 pointsBadges:
  • Home router security vulnerability exposes 12 million devices

    Check Point has uncovered a widespread home router security vulnerability, dubbed Misfortune Cookie, that could allow attackers to gain control over millions of devices.

    Brandan1,115 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.