Rob Tiffany

Tag Archive: Authentication

IoT Minute Episode 31: Authenticating Devices at the Edge

When authenticating devices via an edge gateway, you’re faced with unintelligent devices with no ability to authenticate and smart ones that can.


It’s Time to Dump your 1990s App Authentication

Migrate Win32 applications secured by client/server database logins to mobile apps that useĀ OAuth & enterprise cloud directories for authentication instead.

IoT Attack

12 Steps to Stop the Next IoT Attack in its Tracks

The recent distributed denial-of-service (DDoS) IoT attack against DNS is a wake up call to how fragile the Internet can be.


Improve Employee Productivity at your Company by Implementing a Hybrid Identity Strategy

Identity and Access Management is key to facilitating employee access to corporate and 3rd party resources from any device on any network.