Authentication and GDPR: Covering the Bases

Author: 
SecureAuth + Core Security

 

The European General Data Protection Regulation (GDPR) will take effect on May 18, 2018. The GDPR requires businesses to comply with new rules for collecting, sharing, and protecting personal data within the borders of the European Union (EU) or when exporting information internationally. This applies to any organization that processes personal data of EU citizens, regardless of where that business is located. All companies that do business in Europe will be required to implement a range of security measures.

Symbol-to-Accept: The Newest Innovation in Mobile-Based Authentication

Author: 
Damon Tepe

 

User-friendly Symbol-to-Accept provides the same great user experience as Push-to-Accept while closing critical security gaps

How to Make Friends and Find Your Way at RSA 2018

Author: 
SecureAuth
 

Are you hitting the road and heading to RSA 2018 in San Francisco this April? We know this event is huge and it can be a tad bit overwhelming trying to start a conversation with perfect strangers. So we’re here to help. We’ve got some great people on our team and we want you to know them. We even have map of San Francisco showing where we'll be during RSA 2018!

Staying Secure at 30,000 Feet - Part Two

Author: 
Mike Talon | @miketalonNYC

 

In the first part of this blog, we reviewed how vulnerable you can be while traveling and on a public Wi-Fi network. So how are some ways you can secure and protect your data and credentials while traveling?  Here are a few ways:

1 – You could not use them.  This is the safest, but not always a practical way.  On a six hour plus flight, I could decide not to use the Wi-Fi. Let’s be real, I will definitely be using the Wi-Fi.  

SAML Vulnerabilities: Canonicalization and DOM traversal

Author: 
Jeff Hickman - Enterprise Architect

 

On February 27th, 2018 Duo Security posted a blog about a vulnerability they found in a number of SAML libraries used by a number of vendors, developers, and enterprises alike.

These findings are tied to a number of Common Vulnerabilities and Exposures (CVE) depending on the library or product affected. The filling can be found here: https://www.kb.cert.org/vuls/id/475445.

Staying Secure at 30,000 Feet - Part One

Author: 
Mike Talon | @miketalonNYC

Staying Secure at 30,000 Feet - Part One

How do you protect the credentials on your device, while using Wi-Fi on an airplane or even while riding the train? As airplanes and trains are now being equipped with Wi-Fi access, the concern of your device being secure has grown. Even if your plane isn't Wi-Fi enabled, there's a good chance you will be tempted to sign into the airport Wi-Fi prior to your flight.

Identity 101: Thinking Beyond the Borders of the "Office"

Author: 
Mike Talon | @miketalonNYC

Thinking Beyond the Borders of the "Office"

Organizations exploring potential Identity Access and Management (IAM) solutions often begin by determining how best to control the login and other activities of users who are on their own internal networks and/or connected by Virtual Private Network (VPN). This is a great first step but poses several challenges to the modern enterprise that should not be overlooked. The sooner additional factors are considered, the better overall security the organization can deploy. 

Identity 101: What Are Geo-Location and Geo-Velocity?

Author: 
Mike Talon | @miketalonNYC

 

What Are Geo-Location and Geo-Velocity in Identity Authentication?

Geo-location and geo-velocity are just two of the pre-authentication risk checks included in SecureAuth’s adaptive access control solution. Geo-location and geo-velocity can both offer different levels of protection, and may be employed independently or in tandem; but what exactly are they and how do they work? 

Geo-Location

Pages