For those working as IAM admins, analyst, engineers, etc., configuring connections between various platforms and adding external IdPs can be a pretty regular occurrence depending on your duties. If you’re managing any sort of federation, provisioning, SSO, MFA, or authentication in general, then you’re probably very used to this process. I thought it would be […]
Identity and Access Management
Interested in Identity & Access Management? Here Are a Few Terms to Get Familiar With.
Are you interested in Identity & Access Management and where it fits in the field of cybersecurity? Maybe just curious if it is something you’d like to pursue? If so, I want to share a few terms, concepts, and technologies you’ll come across in the field that would be good to familiarize yourself with. Some […]
False Positive Triggers in IDS vs Biometric Systems
I don’t know about you, but when I think of the term “false positive” I think of something that triggered an alert, but isn’t really a threat or compromise of the system being monitored. This usually applies in IDS, IPS, anti-virus, anti-malware, etc. This is what is referred to by some as a benign trigger, […]