authentication
Key trends for identity and access management
CA Technologies announced its predictions in identity and access management (IAM) and their impact on security professionals in 2014. “We believe that the technology …
OpenSSL site hack wasn’t the result of vulnerability exploitation
After a few days of speculations fuelled by a not clear enough explanation, the OpenSSL Foundation has confirmed that the late December defacement of its Openssl.org website …
BYOD and biometrics in the enterprise – ally or enemy?
BYOD continues its victory march as the enabler of choice among employees juggling increasingly intertwined home and work lives – for IT managers however it is the stuff …
Lessons learned in password security 2013
As 2013 comes to a close, it’s time to reflect on a year of change for password security and the implications for the year ahead. Large scale security breaches this year …
Authentication using visual codes: what can go wrong
Several password replacement schemes have been suggested that use a visual code to log in. However the visual code can often be relayed, which opens up a major vulnerability. …
Building an OATH-compliant authentication server for less than $100
Using a Raspberry Pi nanocomputer and the multiOTP open source library, André Liechti showcases how to how to create an OATH-compliant authentication server at PasswordsCon …
Easy-to-remember, difficult-to-crack passwords via visual cues
A group of researchers from Carnegie Mellon University’s School of Computer Science believe they might have solved the problem of choosing and, above all, remembering …
The iCloud keychain and iOS 7 data protection
When Apple announced iOS 7, iCloud Keychain was one of its key features. It is no doubt great for usability, but what about security? What kind of access does Apple have to …
1Password 4.1 for Mac adds new password updating, better search
Popular password manager 1Password for Mac reached version 4.1 that comes with some long-requested features, the most notable being a new Login (password) updating process. If …
F-Secure launches KEY, a secure password manager
F-Secure Key safely stores your passwords, user names and other credentials so that you can access them wherever you are through one master password. Your personal data is …
Innovations that will shape network security
Headline after headline, some company reports a cyber incident and hangs its head in shame. While it is disappointing, strong businesses have strong leaders that show us how …
Alliance dedicated to wireless biometric authentication launched
Natural Security has announced the launch and newly elected governing board of the world’s first open Alliance dedicated to secure transactions based on wireless and …
Featured news
Resources
Don't miss
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption
- NetBird: Open-source network security
- Burnout in cybersecurity: How CISOs can protect their teams (and themselves)