Joel Snyder, Ph.D., is a senior IT consultant with 30 years of practice. An internationally recognized expert in the areas of security, messaging and networks, Dr. Snyder is a popular speaker and ...
An advisory from the U.S. National Security Agency provides Microsoft Azure administrators guidance to detect and protect against threat actors looking to access resources in the cloud by forging ...
A revolutionary biometric paradigm is transforming the internet by quietly rendering text-based credentials completely ...
Identity checks alone can't stop attackers using stolen session tokens and compromised devices. Specops Software outlines why ...
The U.S. Army’s wearable authentication tokens intended for the tactical environment could be used for nontactical purposes, such as accessing strategic-level systems, enterprise networks and medical ...
The Internet Engineering Task Force (IETF) --the organization that develops and promotes Internet standards-- has approved three new standards this week designed to improve the security of ...
Following some high-profile password hacks, companies like Apple, Twitter and Evernote have moved to shore up their systems with two-factor authentication. Said to be a great missing security link in ...
As passwords routinely fail to protect users, multi-factor authentication (MFA) is fast emerging as the new gold standard of cybersecurity. By adding extra layers of protection, MFA is able to block ...
Token today announced the launch of Token BioKey, a new line of FIDO-compliant security keys that provide enterprises with phishing-resistant, passwordless multifactor authentication (MFA). Built with ...
Application providers charge fees to implement single sign-on but don't deliver a full SSO experience. Threat actors are taking advantage of the situation. We hate asking an organization we are ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results