With the increasing stats of cybercrimes, continuous development of the latest authentication schemes are emerging to tackle the rising cyber threats. Custom Database aka Database as Authentication Source is one such authentication method that's gaining popularity,  thanks to the benefits it offers. Let's take a glance at what's it, How it works, its pros and [...] Read More →
Malware is a catch-all term for any type of malicious software designed to infiltrate or exploit any programmable device, service, or network without the owner's informed consent. Malware can infect computers and devices in several ways and comes in a number of forms, just a few of which include Viruses, Worms, Trojans, OWASP attacks, Brute [...] Read More →
Page and Post Restriction plugin for WordPress is a perpetual, and stable plugin that helps you limit and secure admittance to your WordPress site in various manners.  Page restrictions allow you to control who can view and/or edit individual pages. You can add restrictions for individual pages or for WordPress groups. Multiple roles could be [...] Read More →
MFA (Multi-Factor Authentication) is an authentication process in which a user has to provide multi factors in order to gain access to the particular resources. Resources here means an internet site, an application, network, or a VPN. Rather than just asking for a username and password, MFA (Multi-Factor authentication) adds additional verification factors (OTP, push [...] Read More →
What is OAuth (Open Authorization)? OAuth (Open Authorization) is a standard for authorization of resources. It allows users in an organization to login using OAuth/OpenID connect providers like Microsoft Azure AD, AWS Cognito, Google apps, Facebook, etc & share their information with enterprise applications. It makes use of token-based authorization mechanism to grant access to [...] Read More →