As promised last issue, I’m re-printing a glossary of strong/second factor authentication methods that TriCipher provided me along with the results of its sponsored survey on people’s perceptions of ...
Text message two-factor authentication sounds like a security upgrade. It feels official. It looks responsible. Yet it often ...
ATLANTA – October 4, 2011 – Network security provider Stonesoft today announced the availability of its new Stonesoft a2Cloud solution. This solution offers secure access to the cloud with ...
Businesses are continuing to rely on passwords, and those that are implementing additional authentication factors are choosing outdated options like static questions and SMS codes that leave them ...
Many organizations are decreasing their reliance on user names and passwords for user authentication. They are also learning more about the benefits of deploying strong user authentication to increase ...
What kind of value will a financial institution get for its investment in strong authentication? For FIs, it’s become a burning question, thanks to federal guidance that recommends they boost the ...
As we go about our business in today’s hyper-connected world, it seems we need to use a key, entry code, or password every few minutes. Whether it’s a website, mobile app, laptop, car, hotel door lock ...
ATLANTA, June 14, 2011 /PRNewswire/ -- Equifax Inc. (NYSE: EFX) announced today culmination of the post-acquisition integration of the Anakam Identity Services platform with general availability of ...
PALO ALTO, Calif. & STOCKHOLM--(BUSINESS WIRE)--Yubico, the leading provider of hardware authentication security keys, today announced the general availability of its next-generation FIPS security ...
Retail platforms face rising identity-based attacks like credential stuffing and ATO. Learn how to secure authentication and protect customer accounts from fraud. Act now!
BYOA allows consumers and businesses to employ a variety of authentication methods that are simple to setup and convenient to use This vendor-written tech primer has been edited by Network World to ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results