SSO Isn’t Identity Management
Single sign-on (SSO) has been a popular tool since the mid 2000s, but SSO is not complete identity and access management (IAM). Learn why.
Single sign-on (SSO) has been a popular tool since the mid 2000s, but SSO is not complete identity and access management (IAM). Learn why.
Learn what it takes to manage mobile devices in the workplace and common device management approaches, including MDM, MAM, EMM, and UEM.
Apple has created a new feature: iCloud Private Relay. It allows users to shield traffic from prying eyes. But do you want to allow that? Learn how to turn off that service in this article.
Budgeting helps admins make better decisions about IT resources and teams. It has a positive impact on the well-being and effectiveness of your staff.
Why should you use ARM64? Find out what ARM64 is and why it's the next big thing in instruction set architecture.
Learn about different OpenLDAP use cases, including using GUI wrappers, cloud-hosted OpenLDAP, and multiple OpenLDAP servers.
Most data breaches take months to detect, unintentionally giving hackers visibility into what your organization has been up to. Learn how to detect and stop threats in this Cybersecurity Awareness Month blog.
Learn the top 3 security threats IT professionals ranked the scariest, why they’re so serious, and how to combat them.
Learn how to plan and conduct your first cybersecurity tabletop exercise, including overcoming common obstacles to getting started.
Help end-users understand common phishing tactics and disguises so they can recognize and respond to attacks.
OpenLDAP is the most popular open-source LDAP implementation. Learn how it works, how you can implement it, and popular alternatives.
As organizations shift to entirely distributed work models, IT admins need to set up MFA to keep users secure. Find out how to do so from the cloud.