by Gregg Browinski 0 Comments

The Perilous Quest to Lockdown the Cookie Jar

Even in 2020, many people are unaware that Google's Chrome browser is actually based on an open source project named Chromium. Chromium is an impressive amalgamation of world-class engineers and developers, a fact which has contributed to its success, which, at nearly a 60% market share, is the most popular web browser in the world.

Continue Reading →

Tags: #security, SSO, Single Sign-On, cookies, Chromium, cross-site request forgery, CSRF

by Nancy Wolff Leary 0 Comments

Strengthening Authentication to Adapt to Changing Circumstances

Are you worried that your current IT projects are overly complicated, haven’t been tested sufficiently or may impact existing applications in a way that you have not considered?

Continue Reading →

Tags: 2FA, Authentication, Authentication Methods, Authentication Security, #breach, Compliance, IT Security, #passwords, #security, #phishing, Two-Factor Authentication, secure passwords

by Gregg Browinski 0 Comments

How Can a Cloud Provider Securely Access my Active Directory?

More users and companies are running software applications in the cloud than ever before. When even the US Federal government is looking to get into the cloud, it's a clear indication that it has reached wide acceptance. Similarly, Identity as a Service (IDaaS) has been around for years, but how often do admins considering this approach bother to take a deeper dive into the issue of directory...

Continue Reading →

Tags: Authentication, Authentication Methods, Authentication Security, Cloud SaaS, encryption, firewall, Identity Federation, IT Security, #security, Access Control, Access Management, Active Directory, User Authentication, VPN, OAuth 2.0, OAauth, IDaaS, directory synchronization

by Christopher Perry 0 Comments

What to do When You Don't Always Need Two-Factor Authentication


Two-Factor Authentication (2FA) is an important topic of discussion where security is of concern. Too many data breaches have occurred over the last 10 years purely because of lackadaisical security requirements. Many of these events would have been avoided with a proper Two-Factor Authentication system in place.  Security: personal, private, corporate – the list goes on and on. Each entry a...

Continue Reading →

Tags: 2FA, #2FASolutions, contextual authentication, #contextualauthentication, #passwordmanagement, #security, security questions, #securityandusability, #selfservice, usability, User Experience, #2FA, #2ndfactor, Access Control, Access Management, account management, Password Synchronization, secure authentication, two-factor, Two-Factor Authentication, security trends, geolocation, layer of security, mobile authentication, mobile authenticator, Benefits of 2FA, one click, when you don't need 2FA

by Ryan McDermott 0 Comments

Google reCAPTCHA and More in PortalGuard v5.5 Release

PistolStar, Inc. engineers have released a new version of PortalGuard v5.5 that introduces nine new features! With new feature requests from customers as well as growth in the software industry, we are determined to keep PortalGuard an up to date leader in password security management. 

Continue Reading →

Tags: Authentication, help desk calls, help desk support, HelpDesk, #passwordmanagement, PortalGuard, PortalGuard v5.5, Product Updates, #security, Uncategorized, User Experience, #2FA, Password Security, PistolStar, PortalGuard Update, Product Update, reCAPTCHA, Two-Factor Authentication, user convenience

by PortalGuard 0 Comments

Tap and Pay - Weaknesses of NFC

In today's society, technology is everywhere. If you thought there couldn't be any more technology that you need to deal with, you would be wrong. In fact, there will probably never be a time when there is not some new innovation that you have to think about in the future. The question that you should always consider, however, is this: should we be using that technology and is it safe and...

Continue Reading →

Tags: #bestpractices, IT Security, NFC, #security, Tap and Pay, Dynamic Analysis, stronger authentication, User Authentication

3 Reasons to Adopt Tokenless 2FA


Almost every day, I wake up to some news update about yet another data breach, or who is most at risk of cyber attack today. With even the Healthcare industry being targeted, evidenced in the Anthem healthcare customer data breach and the cost per healthcare record stolen in the 2014 data breach, researching alternate methods on how to better secure confidential data becomes top priority....

Continue Reading →

Tags: Authentication, Authentication Security, #ITSecurity, PortalGuard, #security, Tokenless Authentication, #2FA, PassiveKey, Two-Factor Authentication, User Authentication

Prevent Social Engineering Attacks | Consider This



Human beings are magnificent creatures. In some ways, you could say we are the most advanced creatures on the planet. Now, I don’t know if I would go so far as that, (I mean, some animals seem to have a far better grasp of architecture than humanity, relative to their brains), but we have definitely done some things worth praising over the last few hundred years. Not the least of which is...

Continue Reading →

Tags: Authentication, Authentication Security, Consider This, #cybersecurity, IT Security, #ITSecurity, multilayer authentication, PortalGuard, #security, #ConsiderThis, Password Security, stronger authentication, Two-Factor Authentication, User Authentication

by Gregg Browinski 1 Comment

Bluetooth Two Factor Authentication Alternatives | Contextual Authentication

My family bought a new, 2015 Subaru this year. In a market as competitive as automobile sales, car manufacturers are continually looking to one-up each other by adding more technology and integration options. A perfect example was our test drive. As soon as the car started, the in-dashboard “infotainment” system discovered my cell phone via Bluetooth and offered to pair with it. With a single...

Continue Reading →

Tags: Authentication, Authentication Security, contextual authentication, #cybersecurity, identity management, increased usability, #infosec, IT Security, #ITSecurity, Password, PortalGuard, #securauth, #security, Tokenless Authentication, PassiveKey, Password Security, stronger authentication, User Authentication

Website Authentication Best Practices | Single Sign-on and the Human Factor

There is an interesting divide between how we perceive authentication (proving some aspect of one’s identity), in the physical world versus the digital world. Consider all the ways that you prove your identity in the “real world” through the course of a normal day:


  • A key unlocks and starts your car
  • A garage door opener allows access to a garage
  • An ATM requires both a card and PIN code to...
Continue Reading →

Tags: Authentication Security, #cybersecurity, #HumanFactor, #infosec, IT Security, PortalGuard, #security, SSO, Password Security, Single Sign-On, Single Sign-On (SSO), User Authentication