What Is Attribute-Based Access Control (ABAC)?

Attribute-based access control (ABAC) is an authorisation model that evaluates attributes (or characteristics), rather than roles, to determine access. The purpose of ABAC is to protect objects such as data, network devices, and IT resources from unauthorised users and actions—those that don’t have “approved” characteristics as defined by an…

Magic Links: Passwordless Login for Your Users

Magic links are a form of passwordless login. Instead of the user entering any login credentials to sign in, they are sent a URL with an embedded token via email, and sometimes via SMS. Once the user clicks that link to authenticate, they are redirected back to the application or system having successfully signed in—as if they used a “magic”…

What Is Best-of-Breed Technology?

“Best-of-breed technology” refers to the leading applications, systems, or software in a niche or category.  When organisations take a best-of-breed (or “best-in-breed technology”) approach to building their technology stack, it involves selecting various tools that serve specific purposes. Put another way, instead of purchasing a product suite…

What is SAML?

From CRMs for salespeople to invoice systems for accountants, the proliferation of SaaS web apps has made life easier for many employees. However, even the adoption of the most productivity-enhancing apps can lead to unintended inefficiencies and risks. These can range from frequent “I forgot my password” calls that inundate the IT department to…

6 Steps to Practice Strong Laptop Security

If you’ve ever found yourself searching security questions like “how to secure my work computer” and “laptop security antivirus,” this article is for you. Here, we answer common company laptop security questions like: How do I keep my laptop secure in a public network? What is the best security system for my computer? Is my laptop password safe?…

Archive

Follow Us
Share on Linkedin Share on Youtube