Security Article What is sensitive data? - Article See how protecting sensitive data involves implementing robust privacy and security measures and adhering to complex regulatory requirements. Article What is a supply chain attack? - Article Datasheet Reduce cyber risk: Modernized identity security for Higher Education Insurance Identity security for health funds - Customer success Education Automating onboarding and offboarding - Case study Article What is bring your own device? - Article See why BYOD policies can help balance the benefits of increased mobility and employee satisfaction against the risks of security breaches and data loss. Article HIPAA Security Rule - Article See how the HIPAA Security Rule protects ePHI, optimizes security controls for healthcare organizations, and maintains patient trust. Article What is data protection? - Article See how data protection is essential for organizations to safeguard sensitive information from unauthorized access, breaches, and cyber threats. Article FIDO2: Passwordless authentication - Article See how FIDO2 has been incorporated into various platforms and browsers, making it increasingly accessible to businesses and consumers alike. Article What is cyber defense? - Article See how cyber defense has transformed from simple protective measures to complex proactive strategies that encompass technology, processes, and people. Article What is a brute force attack? - Article See how brute force attacks can allow attackers to gain access to critical systems, causing dangerous and expensive disruptions, and how to prevent them. Article Kerberos authentication protocol - Article See how organizations leverage Kerberos authentication protocol as a framework for authenticating users and services in a distributed network environment. Article What is attack surface management? - Article See how attack surface management offers advance warning and near real-time alerts to get in front of trouble, blocking it or mitigating potential damage. Article OAuth - Article See how the capabilities provided by OAuth have powered the growth of digital services and web applications across many industries and applications. 123Next ›»