Applications

OAuth: Your Guide to Industry Authorization

Nearly a decade ago, the cyber industry was toiling over how to enable access for users between applications and grant access to specific information...

Point-of-Sale (POS) Security Measures for 2021

  It's a tough time to be a retailer. Massive point-of-sale (POS) breaches continue to make headlines on a regular basis, and they can have...

Protecting Against Solorigate TTPs: SolarWinds Hack Defenses

A March 2020 software update of the SolarWinds Orion management platform gave malicious actors unhindered access to key government and enterprise networks. Microsoft has...

Common IT Security Vulnerabilities – and How to Defend Against Them

IT security pros have never faced more threats, whether it's from the huge increase in remote work or aggressive nation-state sponsored hackers like those...

Top Zero Trust Security Solutions

    Zero trust security is a concept that's been around for several years, but it may finally be starting to gain traction as a technology...

Best IAM Software & Solutions

The identity and access management (IAM) market is going through significant changes, as behavior analytics and zero trust become an increasingly important part of...

Application Security Vendor List for 2021

  There are few aspects of modern IT security that are as critical as application security. Simply put, if an application isn't secure, then everyone...

What Is Single Sign-On?

Single sign-on (SSO) solutions let an end user log in just once and...

DevSecOps Training & Best Practices

Many thought the term "DevOps" was just another buzzword. But its usage and...

Container & Kubernetes Security Best Practices

Containers are an increasingly popular way to deploy applications because of the improved...

Latest articles