Google and Facebook are two of the biggest providers for single sign-on on the web, with OAuth2 and OpenID, but if you don't want to put your customers' or employees' data in their hands, Red Hat's Keycloak software lets you run your own operations with the option of integrating existing Kerberos or LDAP accounts.
Machine learning can address risks and help defend the IT infrastructure by strengthening and simplifying cybersecurity.
Keep an attacker's connections open in an Endlessh "tarpit" or delay incoming connections with the more traditional rate-limiting approach of tc.
The FIDO and FIDO2 standard supports passwordless authentication. We discuss the requirements for the use of FIDO2 and show a sample implementation for a web service.
With the need for home offices during the pandemic lockdown, provisional solutions instituted on the fly during the transition from office to home require more permanent solutions, especially for securing TLS connections on the Internet.
We compare three popular packages that are designed to simplify teamwork: EGroupware, Group Office, and Kopano.
We compare seven free blocking filters for advertisements and look at how they integrate into the network.
AWS GuardDuty uses machine learning and threat intelligence to identify malicious activity for continuous security monitoring in the cloud.
Vault is a highly secure, trusted place to keep your secrets and certificates.
Intruders slip in when end users get sloppy. Check the health of your endpoint devices with Stethoscope.