IdP Migration Considerations – Choosing the Right Identity Provider
With the critical role that Identity Providers play, the right IdP can have a huge impact on your organization. Yet, often times, due to the perceived effort in switching vendors, companies feel “locked” in with a legacy vendor. However, new t...
Read More about IdP Migration Considerations – Choosing the Right Identity Provider
Show Filters
Resuscitating John the Ripper for SHA-512
John the Ripper (http://www.openwall.com/john) is a well-known and mature password auditing tool....
Tevora’s Tokenization & Data Field Encryption
Ray Zadjmool in ISSA Journal Lake Forest, CA – November 2010 – Principal Consu...
Read More about Tevora’s Tokenization & Data Field Encryption
How to Parse Firewall Configs with Nipper.
Who said analyzing firewalls and network devices was something tedious and cumbersome? Well your ...
Virtualization, Security & Compliance and How They Can Exist Together
There is no doubt that virtualization is the hot trend right now. Many companies are beginning th...
Read More about Virtualization, Security & Compliance and How They Can Exist Together
Ever get to an authentication challenge in a client application and have that feeling of being ro...