A New Chapter Unfolds: SecureAuth Announces Acquisition of Cloudentity
Exploring the SAP HANA SQL Command Network Protocol – Password-based Authentication and TLS

Exploring the SAP HANA SQL Command Network Protocol – Password-based Authentication and TLS

In this article about SAP security topics, we continue exploring the HANA SQL Command Network Protocol, now ...
Martin Gallo
Google Updates Ad Policies to Counter Influence Campaigns, Extortion

Google Updates Ad Policies to Counter Influence Campaigns, Extortion

Starting Sept. 1, Google will crack down on misinformation, a lack of transparency and the ability to amplify or ...
Tram Nguyen
SecureAuth introduces passwordless login with WebAuthn and a new defense against password attacks

SecureAuth introduces passwordless login with WebAuthn and a new defense against password attacks

SecureAuth Summer 2020 release brings new biometrics-based MFA and login options as well as powerful new defense ...
Dusan Vitek
Biometric Update: Analyze biometrics and behavior with ML to defeat professional attackers, Acceptto security expert urges

Biometric Update: Analyze biometrics and behavior with ML to defeat professional attackers, Acceptto security expert urges

Cybercrime has become a lucrative business employing professional criminals, and harnessing advanced technologies ...
Tram Nguyen
Press Release: Acceptto Onboards Security Veteran Dr. John Zangardi

Press Release: Acceptto Onboards Security Veteran Dr. John Zangardi

Company Identified as Representative Vendor in 2020 Gartner Market Guide for User Authentication (more…)
Tram Nguyen
Exploring the SAP HANA SQL Command Network Protocol – Protocol Basics and Authentication

Exploring the SAP HANA SQL Command Network Protocol – Protocol Basics and Authentication

With this post we continue our series about enterprise software and SAP security articles. I will cover the basics ...
Martin Gallo

Never Miss a Beat
Subscribe to Our Blog

Pin It on Pinterest