As leaders begin implementing biometrics, passkeys and AI threat detection, there are several core design principles they ...
Businesses are continuing to rely on passwords, and those that are implementing additional authentication factors are choosing outdated options like static questions and SMS codes that leave them ...
The cyberbullies of the world like to beat up on the U.S. government. The Office of Management and Budget’s annual Federal Information Security Management Act report to Congress revealed that agencies ...
A couple of weeks ago, we outlined some of the concerns users have about the security of VPNs for corporate use, and some readers have written in saying that their concerns aren’t necessarily about ...
It has become alarmingly clear: e-commerce will not thrive on usernames and passwords alone. Identity theft and online fraud are forcing financial institutions, governments and other organizations to ...
An EBA-ECB report on payment fraud indicates that strong authentication remains effective but fraudsters are still adapting ...
The tools required to become less dependent on password-based security are now in place, according to the Fido Alliance, a consortium of tech industry partners ...
As promised last issue, I’m re-printing a glossary of strong/second factor authentication methods that TriCipher provided me along with the results of its sponsored survey on people’s perceptions of ...