Reduce hacker attack points from outsourced IT

Reduce hacker attack points from outsourced IT Centrify is an identity management software and cloud-based Identity-as-a-Service (IDaaS) provider that helps organisations to manage multiple identities across computer networks and cloud Read more...

Researchers find two flaws in OAuth 2.0

Researchers find two flaws in OAuth 2.0 Security researchers from the University of Trier have discovered a couple of vulnerabilities in the OAuth 2.0 authentication protocol that could enable hackers Read more...