Please turn on your JavaScript for this page to function normally.
Employees admit to accessing or stealing private company information

In a survey of 1,000 employers by LogRhythm, 80 percent do not believe any of their workers would view or steal confidential information, while three quarters (75 percent) …

Entrust updates IdentityGuard Mobile Credential

Entrust announced updates to its mobile smart credential. In addition to offering a multi-purpose digital identity for secure physical, logical and cloud access, the Entrust …

Use your iPhone for biometric scanning

AOptix unveiled AOptix Stratus, the first comprehensive mobile identity solution “Made for iPhone” delivering iris, fingerprint, voice, and face recognition in a …

WordPress.com adds 2-factor authentication option

WordPress users can finally secure their account(s) with two step authentication. The optional feature has been rolled out on Friday and is accessible to all users. To set it …

TypeWATCH: Advanced persistent e-biometrics

Watchful Software released TypeWATCH 1.2, an e-biometrics solution that leverages the science of Keystroke Dynamics to identify and authenticate users simply by the way they …

Privacy-enhanced identity and authentication platform

SecureKey announced its cloud-based briidge.net identity and authentication platform – a solution that enables people to use devices and credentials they already have to …

Apple adds two-step verification option to iCloud accounts

Apple has finally introduced a two-step verification feature that will allow its users to secure their iCloud (Apple ID) accounts, 9 to 5 Mac reports. The option is currently …

Unified identity services across data center, mobile and cloud

Tom Kemp is co-founder and CEO of Centrify Corporation, a software and cloud security provider that delivers solutions that centrally control, secure and audit access to …

Zoosk asks users to reset passwords following mass leak

Online dating service Zoosk is urging some of its users to change their passwords following the leaking of a list of some 29 million passwords that seemingly contains theirs. …

Samsung Galaxy devices’ lock screen easily bypassed

This week revealed not one, but two security vulnerabilities that allow anyone to bypass the lock screen on a variety of Samsung Android smatphones. On Monday UK blogger …

Open standards are key for security in the cloud

The current divide between proprietary and open approaches to enterprise cloud computing has implications beyond the obvious. More than just issues of cloud interoperability …

VASCO launches new card reader for transaction signing and PKI applications

VASCO launched DIGIPASS 870, a USB connectable card reader which can be used in both connected and unconnected mode. In connected mode DIGIPASS 870 can be used for a number of …

Don't miss

Cybersecurity news