As leaders begin implementing biometrics, passkeys and AI threat detection, there are several core design principles they ...
Businesses are continuing to rely on passwords, and those that are implementing additional authentication factors are choosing outdated options like static questions and SMS codes that leave them ...
The cyberbullies of the world like to beat up on the U.S. government. The Office of Management and Budget’s annual Federal Information Security Management Act report to Congress revealed that agencies ...
A couple of weeks ago, we outlined some of the concerns users have about the security of VPNs for corporate use, and some readers have written in saying that their concerns aren’t necessarily about ...
It has become alarmingly clear: e-commerce will not thrive on usernames and passwords alone. Identity theft and online fraud are forcing financial institutions, governments and other organizations to ...
The tools required to become less dependent on password-based security are now in place, according to the Fido Alliance, a consortium of tech industry partners ...
As promised last issue, I’m re-printing a glossary of strong/second factor authentication methods that TriCipher provided me along with the results of its sponsored survey on people’s perceptions of ...
A 2014 global study of U.S. based companies by the Ponemon Institute and Hewlett-Packard found the average cost of cyber-crime climbed by more than 9% year on year, with recent high profile attacks on ...
Today, consumers rely on mobile and online transactions to manage their bank accounts, sign up for mortgages and pay bills. This convenience has a dark side: fraud and phishing are on the rise. But ...