Thursday, November 16, 2017

Running a private certificate authority: What are the risks?

TechTarget
Latest Technology News & Expert Advice     November 16, 2017
TechTarget
Issue Highlights:
Running a private certificate authority: What are the risks?
What knowledge factors qualify for true two-factor authentication?
Samsung S8 iris scanner: How was it bypassed?
Google Docs phishing attack: How does it work?
Learn how to identify and prevent access control attacks
Running a private certificate authority: What are the risks?
Running a private certificate authority can pose significant risks and challenges to meet baseline requirements. Michael Cobb explores what enterprises should know.
What knowledge factors qualify for true two-factor authentication?
Can two-factor authentication be applied to a mobile device that's used as a 2FA factor? Michael Cobb explores the different knowledge factors and uses for mobile devices.
Samsung S8 iris scanner: How was it bypassed?
Hackers bypassed the Samsung S8 iris scanner, which could spell trouble for biometric authentication. Expert Nick Lewis explains how it happened and how to stay protected.
Google Docs phishing attack: How does it work?
A Google Docs phishing attack used OAuth tokens to affect more than a million Gmail users. Nick Lewis explains how it happened, and how to defend against such an attack.
Learn how to identify and prevent access control attacks
Once an attacker has gained entry to a network, the consequences can be severe. Find out how the right access control tools can help prevent that from happening.
This newsletter is published by TechTarget.

TechTarget Member Services, 275 Grove Street, Newton, MA 02466.
Contact: webmaster@techtarget.com

Copyright 2017 TechTarget. All rights reserved. Designated trademarks and brands are the property of their respective owners.

When you access content from this newsletter, your information may be shared with the sponsors or future sponsors of that content as described in our Privacy Policy.

Privacy Policy | Unsubscribe
TechTarget

No comments: