Businesses are continuing to rely on passwords, and those that are implementing additional authentication factors are choosing outdated options like static questions and SMS codes that leave them ...
A look at why identity security is failing in the age of deepfakes and AI-driven attacks, and how biometrics, MFA, PAD, and high-assurance verification must evolve to deliver true, phishing-resistant ...
A couple of weeks ago, we outlined some of the concerns users have about the security of VPNs for corporate use, and some readers have written in saying that their concerns aren’t necessarily about ...
The cyberbullies of the world like to beat up on the U.S. government. The Office of Management and Budget’s annual Federal Information Security Management Act report to Congress revealed that agencies ...
It has become alarmingly clear: e-commerce will not thrive on usernames and passwords alone. Identity theft and online fraud are forcing financial institutions, governments and other organizations to ...
As promised last issue, I’m re-printing a glossary of strong/second factor authentication methods that TriCipher provided me along with the results of its sponsored survey on people’s perceptions of ...
A 2014 global study of U.S. based companies by the Ponemon Institute and Hewlett-Packard found the average cost of cyber-crime climbed by more than 9% year on year, with recent high profile attacks on ...
The tools required to become less dependent on password-based security are now in place, according to the Fido Alliance, a consortium of tech industry partners ...
For years, open standards have been the focal point of creating an identity and access control environment that can scale to the size of the ever-growing Internet. Separate consortia and alliances ...