As promised last issue, I’m re-printing a glossary of strong/second factor authentication methods that TriCipher provided me along with the results of its sponsored survey on people’s perceptions of ...
One of the biggest obstacles that you can help them overcome is the frustration of struggling with password-based login methods. While most people still use passwords as their primary authentication ...
As much as our digital ecosystem has advanced in recent years, some elements of the security world have been slower to change. For example, a shortage of well-trained cybersecurity professionals has ...
CISOs looking to beef up their customer-facing authentication procedures to thwart cyberattacks need to walk a fine line. You want the method to provide tight security without being too complicated, ...
A password alone will not protect sensitive information from hackers--two-factor authentication is also necessary. Here's what security pros and users need to know about two-factor authentication.
Authentication has been a part of digital life since MIT set up a password on their shared-access computer in 1961. Today, authentication covers virtually every interaction you can have on the ...
Human relationships rely on trust, which is why the true history of authentication extends back long before the first written documents referencing it. I suspect that as early as humans formed tribes, ...
Microsoft this week announced a few Azure Active Directory improvements. The improvements include a "Converged Authentication Methods" addition for centralizing the management of authentication ...
A number of factors inspired me to take a closer look at the Yubikey. For starters, it is such a simple and elegant solution to two of the major problems the security industry is facing these days: ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results