ComputerWeekly.com Research Library

Powered by Bitpipe.com

Authorization Research

  • Business email compromise prevention tips

    Sponsored by: TechTarget ComputerWeekly.com

    It's easy to see why Business Email Compromise attacks work. Preventing them, however, is not so simple -- especially when attackers rely on cognitive biases. Distinguishing between genuine and fraudulent email communications is challenging enough -- and it's also only part of reducing BEC risk. Here are 8 BEC prevention tips for security leaders.

  • 12 API security best practices

    Sponsored by: TechTarget ComputerWeekly.com

    As more businesses enable access to data and services through APIs, these vectors present an attractive target for data theft and software attacks. Insecure APIs are a serious threat - the following 12 best practices can help expand and elevate the security of an organization's APIs.

  • 5 types of data security

    Sponsored by: TechTarget ComputerWeekly.com

    Because no single form of data exists, no single magic-bullet technique can secure all data. A defense-in-depth data security strategy is made up of a combination of tools, techniques and policies. This infographic gives an overview of the must-have data security technologies.

  • Multifactor authentication: What are the pros and cons?

    Sponsored by: TechTarget ComputerWeekly.com

    One of the biggest shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. In this infographic we outline the key pros and cons of adopting multifactor authentication to protect users' identities and secure your systems.

  • Password Security Guidelines

    Sponsored by: TechTarget

    In this expert guide to Password Security Guidelines, learn how you can keep your enterprise safe by improving your password policies today. We ask you to participate in our Security Market Research Program to receive a free download of the guide.

  • Implementing a Zero-Trust Approach to Network Security

    Sponsored by: TechTarget

    Implementing zero trust requires creating detailed policies and devising certain "hoops" through which those wanting access to critical infrastructure must jump. Not an easy task. Luckily, searchSecurity is here to help. Participate in our IAM research program for access to our guide, Implementing a Zero-Trust Approach to Network Security.

  • Making Sense of Zero-Trust Security

    Sponsored by: TechTarget

    As security professionals continue searching for methods of keeping out intruders, they make clear their thoughts about zero trust and how its philosophy can keep users safer. As it stands, 40% of professionals support zero trust for their organizations – do you? Take our survey to let us know, and receive a FREE zero-trust guide as a bonus.

  • Getting Customer IAM Right

    Sponsored by: Ping Identity Corporation

    For organizations that interact directly with end-users, customer IAM (CIAM) has been a growing necessity for several years. Regardless of the name, CIAM is vastly different from employee IAM, both in terms of approach and end goals. This white paper highlights the differences between the two and offers tips for getting started with CIAM.

  • How IAM Systems Support Compliance

    Sponsored by: Beta Systems

    Many organizations believe that if certain technologies and tools are put in place, processes are reviewed and risk assessments are conducted, they’re compliant. But the reality of compliance goes deeper than simple implementation and review. Read this expert guide to understand the role played by IAM in establishing and maintaining compliance.

  • 5 IAM Trends Shaping the Future of Security

    Sponsored by: Beta Systems

    Modern identity and access management (IAM) tools, capabilities and offerings are a direct result from years of cyberthreats targeting credentials, privileged accounts and passwords. Read this e-guide to discover 5 IAM trends that are shaping the future of the cybersecurity market.

  • 4 Top Identity and Access Management Trends

    Sponsored by: Onfido

    As end-user security threats continue to rise, it becomes more crucial for IT pros to have identity and access management tools. However, the tools offered in the identity and access management market are evolving and IT pros need to catch up. In this e-guide, explore the top 4 identity and access management trends shaping the market right now.

  • The Future of Identity and Access Management Tools

    Sponsored by: Jumio

    Fingerprints, facial recognition, and voice recognition are now on the market as identity management tools, but much more is still needed. Find out how organizations plan to implement a new level of identity management that relies less on user actions and more on known things, places, and experiences.

  • Securing content and access with smart management techniques

    Sponsored by: TechTarget Content Management

    When it comes to ECM systems, the challenge for content management executives is to balance security with accessibility. To help with this task, here is a handbook of best practices – exploring topics on CMS security, IAM strategies, Office 365 and more.

  • Authentication 101: What You Need to Know

    Sponsored by: HYPR

    What does your enterprise need to know about the FIDO authentication framework? In this expert e-guide, security pros Randall Gamby and Alastair Cooke dive into the FIDO authentication framework and offer 6 VDI testing steps for deployment.

  • An Introduction to the FIDO Authentication Standard

    Sponsored by: HYPR

    63% of all successful data breaches can be tracked back to inadequate passwords, according to Verizon's DBIR. In this e-guide, security experts David Strom and Michael Cobb explore the Fast Identity Online (FIDO) Alliance and the impact it has on authentication and password protocols.

  • All You Need to Know about SSO

    Sponsored by: HYPR

    The most important part of single sign-on (SSO) deployment is planning. In this e-guide, security experts Joel Dubin and Eric Klein offer SSO best practices for deployment and integrating mobile app access.

  • Your Guide to MFA

    Sponsored by: HYPR

    Many IT departments want to enforce multifactor authentication (MFA) on corporate content because the more layers of authentication a user has to go through means more data security. Explore this expert e-guide to gain insight into how companies are implementing MFA strategies and how biometrics plays a role in MFA security.

  • How Can Privileged Access Accounts Be Managed in Large Companies?

    Sponsored by: One Identity

    According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.

  • How can organizations get control over privileged identity management?

    Sponsored by: One Identity

    Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information

  • Getting Started with Cloud IAM Services

    Sponsored by: OneLogin

    In this e-guide learn how to get started with IAM services in the cloud, as well as what you need to know about cloud IAM before implementation.

  • SWIFT Banking System Boosts Security Following Cyberattacks

    Sponsored by: BAE Systems Applied Intelligence

    Following a number of attacks on the SWIFT banking system that led to the theft of millions of dollars, SWIFT promised new rules to improve security for bank transfers. In this e-guide, we examine these targeted malware attacks and explore SWIFT's response to them. Find out if their 5-part strategic program was enough to bolster security.

  • How IAM has Evolved on the Cloud: The Good and the Bad

    Sponsored by: IBM

    Learn how IAM has evolved on the cloud, what has worked well and what IAM procedures need to be strengthened to meet future threats in various virtual environments.

  • The Digital Certificate: How It Works, Which to Buy

    Sponsored by: TechTarget Security

    If you're in the market to buy digital certificates, read this guide to learn what features are essential and how to evaluate the available options.

  • Take Control of Virtual Desktop Access with Two-Factor Authentication

    Sponsored by: Citrix

    In this expert e-guide, we explore the concept of two-factor authentication (2FA) and how it applies to virtual desktop access. Find out how this approach improves password management without adding complexity to the user experience.

  • Insider Security Threats: What CISOs Can Do to Mitigate Them

    Sponsored by: Preempt Security

    Insider security threats will always exist, but there are steps you can take to limit their impact. Discover how to implement technical access control and authentication to ensure only the right eyes are consuming sensitive data.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.