What is digital identity?
Digital identity is the way a computer stores a record of an external person or system. It is closely related to authentication. What is digital identity? In access management, digital…
Your Go-To Source for Cyber Security Insights and Solutions
Digital identity is the way a computer stores a record of an external person or system. It is closely related to authentication. What is digital identity? In access management, digital…
Token-based authentication is one way to confirm a user’s or device’s identity. It relies on checking whether the entity possesses a previously issued token. What is token-based authentication? Token-based authentication…
With two-factor authentication (2FA), users must prove their identity through two different means before being granted access. What is two-factor authentication? Two-factor authentication, abbreviated as 2FA, is an authentication process…
Identity and access management (IAM) solutions protect company data even when employees do not enter the office. What are the security challenges of a remote workforce? In an on-premise working…
The DNS CNAME record works as an alias for domain names that share a single IP address. A “canonical name” (CNAME) record points from an alias domain to a “canonical”…
Okta is warning nearly 5,000 current and former employees that their personal information was exposed after a third-party vendor was breached. Okta is a San Fransisco-based cloud identity and access…
The Slowloris attack attempts to overwhelm a targeted server by opening and maintaining many simultaneous HTTP connections to the target. What is a Slowloris DDoS attack? Slowloris is a denial-of-service…
A low and slow attack is a DDoS attack that aims to stop a web service using extremely slow HTTP or TCP traffic. What is a low and slow attack?…
Simple but effective “cheat sheet” on internet/networking protocols, simple examples of how they work, and use case scenarios for how a protocol would typically be used.
Okta says attackers accessed files containing cookies and session tokens uploaded by customers to its support management system after breaching it using stolen credentials. “The threat actor was able to…