authentication
How much of a risk is BYOD to network security?
We’re all familiar with BYOD dangers: data breaches exploited because of a lack of proper security protocols and encryption on devices or missed operating system …
Passwords, biometrics and multi-factor verification: What businesses need to know
Verifying identity is a double headache for small businesses. On the one hand, there’s the question of identity verification within your organization. You need to be sure only …
UK banks ramp up account security with voice recognition tech
British banking and financial services multinational Barclays has announced that it is introducing voice recognition technology for all personal banking customers, so that …
Review: True Key for iOS
I’ve been using 1Password for years – both their desktop and mobile products. Altough it works fine, I was curious to see what are the alternatives I can use on my …
Top 10 strategic technologies for government in 2016
After nearly a decade of “doing more with less,” government CIOs remain under pressure to further optimize IT and business costs while leading digital innovation …
Google’s new authentication option: a tap on the screen
Google knowns that usability is a pre-requisite for security, so they’ve come up (yet again) with a new option within the 2-step verification feature for Google …
Behavior is the new authentication: A look into the future
In the next few years organizations will face extreme IT security challenges. Hackers are targeting humans instead of machines. All the most costly cyber attacks (APTs, …
Milagro: A distributed cryptosystem for the cloud
A new open source project within the Apache Incubator aims to create an alternative to outdated and problematic monolithic trust hierarchies such as commercial certificate …
Do users’ perceptions of password security match reality?
Think your password is secure? You may need to think again. People’s perceptions of password strength may not always match reality, according to a recent study by CyLab, …
Let’s stop talking password flaws and instead discuss access management
A good bit of attention has been given to a new report that suggests that there are organizations that don’t change their administrative passwords at all, ever. While it may …
Living in a password free world in the modern enterprise
The era of password security in the modern enterprise is over. Passwords are dead. Let’s be honest. Passwords in the enterprise were never really that secure in the …
1 in 10 people have posed as someone else online
Our need for ease and convenience is putting our digital identities and security at risk. A new BehavioSec report finds that 37% of us have shared our personal security data …
Featured news
Resources
Don't miss
- Radio signals could give attackers a foothold inside air-gapped devices
- Product showcase: RoboForm password manager for iOS
- LLMs are automating the human part of romance scams
- Superagent: Open-source framework for guardrails around agentic AI
- Security chaos engineering matters when nothing is broken