Authentication

asteroid

Security Experts Offer Advice to Avoid a ‘Near Miss’

Outer space is a huge, vast expanse of emptiness. There are endless numbers of asteroids and other debris zooming through the galaxy at blazing speed, and every once in a while one of them somehow manages to crash into our […]

Security Experts Offer Advice to Avoid a ‘Near Miss’ Read More »

keys

Poorly Managed Keys and Certificates Put You at Risk

There’s a popular meme online that goes, “On the Internet, nobody knows you’re a dog.” The phrase is from a cartoon published in The New Yorker in July of 1993, which illustrates the anonymity of the Internet. Regardless of who

Poorly Managed Keys and Certificates Put You at Risk Read More »

binary

Weakened Encryption Will Cause Compliance Chaos

There has been increasing demand from government and law enforcement in recent months for some sort of encryption backdoor. The theory–whether grounded in reality or not–is that an encryption backdoor will allow intelligence agencies to detect and prevent more terrorist

Weakened Encryption Will Cause Compliance Chaos Read More »

Eyeball

Biometrics: Physical Attributes vs. Behavioral Patterns – The Privacy Debate

Account takeovers are increasingly affecting a growing population of online user accounts due to a confluence of threats, such as weak consumer password practices, frequent mass data breaches and brute force attacks against web properties. The scope, scale and frequency

Biometrics: Physical Attributes vs. Behavioral Patterns – The Privacy Debate Read More »

passwords

Anyone can know your password, but there’s only one you

If the only thing separating a cyber criminal, online stalker or identity thief from your personal data and information is a password or PIN you’ve already lost. There are three primary methods of authentication but “something you know” is the

Anyone can know your password, but there’s only one you Read More »

Scroll to Top