Nearly a decade ago, the cyber industry was toiling over how to enable access for users between applications and grant access to specific information about the user for authentication and authorization purposes. Enter authorization-focused OAuth 2.0 and authentication-focused OpenID Connect (OIDC). In the last decade, organizations adopted OAuth and its companion OIDC to enable customers…
Kaspersky makes very good endpoint security software, one of just four companies to make both our top endpoint detection and response (EDR) and best antivirus software product lists. But the Moscow-based company has faced allegations that it has been compromised by the Russian Federal Security Service (FSB). Those allegations remain unproven, and Kaspersky has gone…
Mobile communications are an increasingly integral part of their everyday lives for people at work and at play. But as mobile access has grown, so have mobile security threats. Such threats are lucrative for hackers and frustrating for companies trying to thwart their attacks. Here are the 10 top mobile security threats, as suggested…
As users have increasingly moved from desktop operating systems to mobile devices as their primary form of computing, cyber attackers have taken notice and malware has followed. While the total volume of mobile malware is a fraction of that created for desktops, it is nonetheless a growing security concern, as more and more high-value and…
The era of employees bringing their own devices into corporate environments created the need for advanced technology platforms to help control all types of devices. Bring Your Own Device, often shortened to BYOD, opens up organizations to new risks and creates a need for a new type of device control. What is MDM? Mobile Device Management, or…
A core element of computing access is end users and their devices. It is the device that will access a network or corporate application and it is often the device that represents the “last mile” of security for any organization. To understand device security, it’s critical to have some measure of control and management over…
The modern enterprise is mobile and employees are no longer tethered to their corporate owned and provisioned computing equipment. As is the case in the wired world, mobile end-user devices need to be managed to improve employee productivity and to reduce enterprise security risks. That’s the world that Enterprise Mobility Management (EMM) inhabits. What is…
What is a CASB? A CASB provides enterprises with a critical control point for the secure use of cloud services across multiple cloud providers. Software as a service (SaaS) apps are becoming pervasive in enterprises, which exacerbates the frustration of security teams looking for visibility and control of those apps. CASB sales have soared as…
By Aleksey Gavrilenko, Itransition Approaches to security issues change constantly, along with evolving threats. One approach is to implement OAuth, an open authorization standard that provides secure access to server resources. OAuth is a broad topic with hundreds of articles covering dozens of its aspects. This particular article will help you create a secure authorization…
While Apple blocks full anti-virus apps from its App Store, counting on its own technology and systems to protect its users (in a whitepaper [PDF], the company states, “Every iOS device combines software, hardware and services designed to work together for maximum security and a transparent user experience”), there are several key steps worth taking…