authentication
Cloud identity tools for LinkedIn, Twitter and Microsoft Live
Ping Identity released Cloud Identity Connectors for LinkedIn, Twitter, and Microsoft Live, enabling the enterprise to rely on cloud service providers and social networking …
The rise of layered fraud prevention
By 2014, 15 percent of enterprises will adopt layered fraud prevention techniques for their internal systems to compensate for weaknesses inherent in using only authentication …
Google authentication protocol flaw endangers Android users
If you’re an Android user that has still not upgraded to the 2.3.4 and 3.0 version, you’re in danger of having the information contained in various Google …
OpenID Attribute Exchange flaw
The OpenID Foundation has issued an alert for all sites using OpenID that don’t confirm that the information passed through Attribute Exchange – the service …
Governance on unstructured data
Businesses face challenges when implementing sound policies for dealing with their unstructured data, an ever-present thorn in the side of most enterprises today. It is …
Embed strong authentication into mobile applications
To improve the speed and efficiency in which financial institutions develop and provide customers secure, trusted mobile banking applications, Entrust announces their …
Creating a secure firewall policy for a large company
When it comes to a network security policy, there often seems to be a direct tradeoff between security and maintainability. This doesn’t always have to be the case. Even …
Entrust expands authentication platform
Entrust is extending their Non-Federal Identity SSP service to include Personal Identity Verification-Interoperable (PIV-I) compliance for state governments, the private …
Facebook announces two-factor authentication
Facebook will be rolling out the two-factor authentication option which, once turned on, will ask users to insert a code when they try to log into the social network from a …
App employs facial recognition to prevent visual eavesdropping
Oculis Labs released PrivateEye Enterprise, a desktop security application that employs facial recognition and detection algorithms with a standard webcam to actively protect …
The expanding role of digital certificates… in more places than you think
A scribbled signature may have been enough to verify your identity 20 years ago, but today’s online world requires more advanced — and authenticated or encrypted — …
Integrated single sign-on and authentication to cloud and SaaS
SafeNet announced Authentication Manager (SAM) 8.0. The unified enterprise platform combines strong authentication and identity federation to help organizations centrally …
Featured news
Sponsored
Don't miss
- Google on scaling differential privacy across nearly three billion devices
- Lottie Player supply chain compromise: Sites, apps showing crypto scam pop-ups
- North Korean hackers pave the way for Play ransomware
- IoT needs more respect for its consumers, creations, and itself
- How agentic AI handles the speed and volume of modern threats