authentication
What is driving the machine identity crisis?
Every machine needs a unique identity in order to authenticate itself and communicate securely with other machines. This requirement is radically changing the definition of …
Review: Specops Key Recovery
Mobile device use continues to grow, while an increasingly mobile and remote workforce depends heavily on laptops. To secure those devices, organizations need to implement …
Users still engaging in risky password, authentication practices
IT security practitioners are aware of good habits when it comes to strong authentication and password management, yet often fail to implement them due to poor usability or …
Looking at the future of identity access management (IAM)
Here we are: at the beginning of a new year and the start of another decade. In many ways, technology is exceeding what we expected by 2020, and in other ways, well, it is …
More authentication and identity tech needed with fraud expected to increase
The proliferation of real-time payments platforms, including person-to-person (P2P) transfers and mobile payment platforms across Asia Pacific, has increased fraud losses for …
Zero Trust: Beyond access controls
As the Zero Trust approach to cybersecurity gains traction in the enterprise world, many people have come to recognize the term without fully understanding its meaning. One …
Review: Enzoic for Active Directory
Seemingly every day news drops that a popular site with millions of users had been breached and its user database leaked online. Almost without fail, attackers try to use …
Facebook users will be notified when their credentials are used for third-party app logins
Facebook will (finally!) explicitly tell users who use Facebook Login to log into third-party apps what information those apps are harvesting from their FB account. At the …
High-risk Google account owners can now use their iPhone as a security key
Google users who opt for the Advanced Protection Program (APP) to secure their accounts are now able to use their iPhone as a security key. About Google’s Advanced Protection …
Fraud prevents a third of businesses from expanding digital capabilities
Kount released a new research report on digital innovation and emerging fraud, which found that the most innovative businesses are also the ones facing the greatest fraud …
Facial recognition hardware to reach over 800 million devices by 2024
A new report from Juniper Research found that facial recognition hardware, such as Face ID on recent iPhones, will be the fastest growing form of smartphone biometric …
Only 54% of security pros have a written policy on length and randomness for keys for machine identities
People rely on usernames and passwords to identify themselves to machines so they can gain access to data and services. Machines also need to authenticate themselves to each …
Featured news
Sponsored
Don't miss
- How open-source MDM solutions simplify cross-platform device management
- Google on scaling differential privacy across nearly three billion devices
- Lottie Player supply chain compromise: Sites, apps showing crypto scam pop-ups
- North Korean hackers pave the way for Play ransomware
- IoT needs more respect for its consumers, creations, and itself