• Integrating biometric authentication with Active Directory

    Integrating biometrics with an existing enterprise IAM architecture was once a trying task, but it's much easier today because many biometrics products are designed to work hand in hand with Active Directory. Joel Dubin explains what Active Directory can do and how financial organizations can make...

    ITKE346,430 pointsBadges:
  • Data leakage detection and prevention

    While corporate data loss is not a new concern, newer technologies are emerging to help combat the threat. In this tip, Joel Dubin advises how to reduce data leaks, reviews products that can identify network vulnerabilities and keep mobile device data leakage threats at bay.

    searchsecurity21,075 pointsBadges:
  • Identifying and preventing router, switch and firewall vulnerabilities

    Routers, switches and firewalls are easy targets for hackers. Network security expert Brad Casey offers advice on keeping network devices secure.

    searchsecurity21,075 pointsBadges:
  • Customer data privacy looms large in social business

    Using social media to gather data on customers has been rife with opportunities -- and risks -- for customer data privacy.

    Lauren Horwitz850 pointsBadges:
  • Social networking security: Twitter, Facebook hacker attacks climbing

    Roundup: Get the latest news on social networking security and stay up to date on the tactics, methods and techniques that cybercriminals are using to break into Twitter, Facebook, and other social network accounts to steal data.

    ITKE346,430 pointsBadges:
  • Rogue IMSI catchers heighten enterprise cell phone security risks

    News roundup: Rogue cell phone towers are popping up across the United States, heightening enterprise communication and data privacy concerns. Plus: Goodwill breach update; Adobe patches released; and security in 2025.

    SharonShea60 pointsBadges:
  • How to build complex passwords and avoid easy breaches

    In the wake of the iCloud celebrity photo hack, expert Keith Palmgren offers advice on how to build more effective passwords and avoid easy data breaches.

    ITKE346,430 pointsBadges:
  • Screencasts: On-screen demonstrations of security tools

    SearchSecurity.com's screencast series allows top experts to demonstrate popular information security tools and techniques, including UTM configuration, Google hacking, and Snort IDS use.

    ITKE346,430 pointsBadges:
  • Bitcoin exchanges maturing, but Bitcoin security still a concern

    The Bitcoin market is maturing but security issues, such as private key management, persist. The Bitcoin Foundation gives the good news and bad news regarding Bitcoin security.

    ITKE346,430 pointsBadges:
  • Is Bitcoin safe? The truth about Bitcoin security and crypto-currency

    Bitcoin security may not be a top enterprise concern at the moment, but it may soon be. Michael Cobb explains how to ensure crypto-currency safety.

    searchsecurity21,075 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.