Single sign-on (SSO) allows users to access multiple applications with a single set of login credentials. While convenient, SSO can present security risks, as one set of credentials could grant bad ...
Waltham, Mass.--January 7, 2013--Aveksa today announced new Single Sign-On (SSO) capabilities for MyAccessLive, Aveksa's Cloud-based Identity and Access Management offering. With the new MyAccessLive ...
Cisco has released security updates to patch four critical vulnerabilities, including a fixed improper certificate validation flaw in the company's cloud-based Webex Services platform that requires ...
Imprivata normally would be featured in the Identity Management newsletter (and often is, for that matter) but its latest release is aimed squarely at the Windows networking market so I’d thought I’d ...
Mosyle (www.mosyle.com), an Apple mobile device management (MDM) software company, has unveiled new identity management solutions: Single Sign-On and Mosyle Auth. Available now in public beta, these ...
What if banks could act as digital gatekeepers, protecting all their customers pursuits on the Web? Instead of each consumer having 100 sets of usernames and passwords to remember for all the websites ...
Striking the right balance between complex passwords, security and workflow efficiency is a big challenge for healthcare CISOs and CIOs. The rising number of publicly reported breaches shows the need ...
Single sign-on is often safer, but it ties many apps to one “master” account. Here's how to secure it well and revoke old app ...
Vonage Desktop and Mobile applications require authentication using your Drexel credentials, just like Outlook, OneDrive, and other Microsoft 365 apps require. Using Drexel Single Sign-On to access ...
Eric Leach, director of product management at Sun, said the Santa Clara, Calif.-based company will open-source the technology through the Open Source Web Single Sign-On, or OpenSSO project. That ...
Forbes contributors publish independent expert analyses and insights. I write about contemporary cybersecurity and online privacy issues. Before talking about what authentication is and how it works, ...