The Latest in IT Security

Posts Tagged ‘user authentication’

The average enterprise, according to many estimates, has between 200-500 individual security products installed, ranging from multiple products deployed on user endpoint devices, all the way up to large scale network monitoring and protection software/appliances, as well as cloud-based service offerings. Many products, especially those that have been installed for a while, are located on […]

Read more ...

Cloud-based communications platform Slack finished patching a severe security hole Thursday affecting portions of its platform that used the Security Assertion Markup Language (SAML) standard for user authentication. The flawed implementation of SAML by Slack impacted mostly enterprise customers who are its primary users as a means of authentication to access Slack accounts. Read More

Read more ...

The first month of this leap year did not offer any major surprises in terms of information security. However, Doctor Web’s anti-virus laboratory received samples of several new banking Trojan horses that turned out to be rather unusual. In addition, a new technique for distributing malicious links was discovered. Virus threats in January The file […]

Read more ...


Categories

FRIDAY, APRIL 26, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments