SAML is an open standard facilitating the communication and verification of credentials between identity providers and service providers for users everywhere.
In 2005, the open standard consortium...
The Remote Desktop Protocol (RDP) has long been essential for IT service management and remote access. Still, in the wrong hands, RDP attacks and vulnerabilities related to remote desktop software ar...
The growth of DevSecOps tools is an encouraging sign that software and application service providers are increasingly integrating security into the software development lifecycle (SDLC).
The top D...
A SaaS security company says a spike in cyber attacks from Russia and China in recent weeks suggests the two countries may be coordinating their cyber efforts.
SaaS Alerts, which helps managed serv...
Professional penetration testers, or pen testers, are akin to "white hat" or ethical hackers, adversaries with an explicit authorization to attack a network. During this simulation of real-world condi...
How can a hospital protect an MRI machine with an unchangeable password and still connect it to the network? How can an industrial recycler safely secure its $400,000 hard drive recertification rack w...
Invisibility sounds like something out of a fantasy novel, but if done properly, we can use it to hide computers, gateways, or individual PCs by implementing specific firewall techniques like port kno...
Facial recognition software (FRS) is a biometric tool that uses artificial intelligence (AI) and machine learning (ML) to scan human facial features to produce a code. It compares this code with its e...
Microsoft is shutting a couple of security holes, including one that has been a favored target of attackers for years and another that the enterprise software giant recently learned could be exploited...
Single sign-on (SSO) is one of several authentication technologies aimed at streamlining and keeping login information and processes secure. SSO makes it feasible for one login to be enough for a grou...