SAML is an open standard facilitating the communication and verification of credentials between identity providers and service providers for users everywhere.
In 2005, the open standard consortium...
Managing mobile apps and devices is a challenge faced by all organizations these days. One technology that’s evolved to address mobile security, access management, and control is enterprise mobility m...
IoT security is where endpoint detection and response (EDR) and enterprise mobility management (EMM) meet the challenges of a rapidly expanding edge computing infrastructure. As the enterprise attack...
Remote work and home offices were an afterthought until the COVID-19 pandemic. They were then vaulted to the forefront of security concerns so quickly that security and IT teams were caught off guard....
The European Union is poised to place more demands on manufacturers to design greater security into their wireless and Internet of Things (IoT) devices.
In an amendment to the EU’s 2014 Radio Equip...
This post has been updated for 2021.
Passwords are the most common authentication tool used by enterprises, yet they are notoriously insecure and easily hackable. But even when passwords are secure...
5G is on the cusp of widespread adoption.
Consumers and organizations are enthused about the operational benefits of more robust mobile connectivity, but the shift to 5G networks doesn't come with...
As users have increasingly moved from desktop operating systems to mobile devices as their primary form of computing, cyber attackers have taken notice and malware has followed. While the total volume...
Reports that the NSO Group’s Pegasus spyware was used by governments to spy on Apple iPhones used by journalists, activists, government officials and business executives is becoming a global controver...
Nearly a decade ago, the cyber industry was toiling over how to enable access for users between applications and grant access to specific information about the user for authentication and authorizatio...