As promised last issue, I’m re-printing a glossary of strong/second factor authentication methods that TriCipher provided me along with the results of its sponsored survey on people’s perceptions of ...
Remember when hardware tokens and complex passwords were the only ways to deliver secure access? Today, mobile and cloud applications are driving demand for convenient authentication methods to serve ...
As much as our digital ecosystem has advanced in recent years, some elements of the security world have been slower to change. For example, a shortage of well-trained cybersecurity professionals has ...
Multi-factor authentication (MFA) is becoming a mandatory security requirement for all businesses across all sectors. The most recent example is the new version of ...
Authenticating users who log onto your network by account name and password only is the simplest and cheapest (and thus still the most popular) means of authentication. However, companies are ...
Microsoft this week announced a preview of "Authentication Strength," a new control for organizations using the Azure Active Directory Conditional Access service. Authentication Strength lets IT pros ...
Michael Engle is Cofounder at 1Kosmos and was previously head of InfoSec at Lehman Brothers and Cofounder of Bastille Networks. In many enterprise environments, it’s common for identity verification ...
Multi-factor authentication software protects customer accounts from unauthorized access and data breaches. The right platform stops account takeovers while making login easy for legitimate users.
Results that may be inaccessible to you are currently showing.
Hide inaccessible results