INE, a global provider of networking and cybersecurity training and certifications, today released its Top 5 Network Security Trends of 2026, outlining the most significant forces reshaping how ...
In the NAC products we tested, authentication varies from very strong to very weak, and every point in-between. When starting down your path of evaluating NAC products, decide very early what kind of ...
Many years ago, I admired my sister’s deadbolt. I made a silly comment as to how it looked like it would be impossible to break into the New York City apartment. My brother-in-law corrected me. “It’s ...
Learn why passwordless authentication is crucial for external vendors & partners. Reduce breaches, stop password sharing, ...
WatchGuard Technologies is continuing to add to its security platform for SMBs, announcing on Tuesday that it had acquired Datablink to boost its authentication capabilities. WatchGuard said the ...
Optiv Canada has been awarded the first major enterprise contract under Shared Services Canada’s (SSC) cybersecurity procurement vehicle (CSPV) for its network device authentication (NDA) solution, ...
A deep dive comparing API Keys, OAuth 2.0, JWT, and HMAC for CTOs. Learn which api authentication method fits your enterprise SSO and IAM strategy.
Karen Scarfone is the principal consultant for Scarfone Cybersecurity. She provides cybersecurity publication consulting services to organizations and was formerly a senior computer scientist for the ...
SecureW2 -- the leading provider of continuous, policy-driven authentication solutions -- today announced that its cloud-native JoinNow Platform received ten prestigious 2025 Cybersecurity Excellence ...