by Christopher Perry 0 Comments

Prophecy Vs. Reality: Popular Cybersecurity Trends of 2019

Society loves prophecy.  Whether it’s used as a justification for acts of good or evil, or even if it’s just a matter of looking at your friend and saying “HA!  I was right!”  Correctly predicting what’s coming is a safe bet in terms of drawing interest, and it is a small wonder that even the biggest tech giants have hopped on that bandwagon.  Of course, prophecy and reality often differ, and...

Continue Reading →

Tags: 2FA, Authentication, authentication management, Authentication Security, authentication security, cloud, Cloud SaaS, cloud security, #cybersecurity, encryption, Gartner, Identity Provider, MFA, Multi-Factor Authentication, #passwords, #ssoimplementations, trust, Authentication Provider, Cloud authenticaiton, Cloud Authentication, data breach, data security, password encryption, two-factor, Two-Factor Authentication, #twofactor, security trends, password habits, secure acounts, password-based authentication, passwordless, Keeping your information safe, NIST, contextual Two-Factor Authentication, usual password, Google, identity solutions, open-source software, haveibeenpwned.com, two-step authentication, two-step verification, real-time monitoring

Ask Christopher - Why should I use the SQL Back-End with my PortalGuard implementation?

Knowing where to store user data is tough.  Many variables must be considered before making a final decision, and the choice itself is never easy.  PPortalGuard offers two different options for storing user-specific data: the file system and an SQL backend.  While the initial choice may be daunting, it really is a no-brainer when you think about it.

For many administrators, implementing an...

Continue Reading →

Tags: CAS, PortalGuard, SQL, User Experience, data security, Single Sign-On, Ask Christopher, empower users, CAS SSO, compliances, administrator, online security, improve security, security compliance, SQL Monitoring Utility Tool, user profiles, features, user data, user-specific data, end-users, data compliance, NIST, web-utility, contextual Two-Factor Authentication, load balanced environments, cost-effective, reporting