Authentication

binary

Weakened Encryption Will Cause Compliance Chaos

There has been increasing demand from government and law enforcement in recent months for some sort of encryption backdoor. The theory–whether grounded in reality or not–is that an encryption backdoor will allow intelligence agencies to detect and prevent more terrorist […]

Weakened Encryption Will Cause Compliance Chaos Read More »

Eyeball

Biometrics: Physical Attributes vs. Behavioral Patterns – The Privacy Debate

Account takeovers are increasingly affecting a growing population of online user accounts due to a confluence of threats, such as weak consumer password practices, frequent mass data breaches and brute force attacks against web properties. The scope, scale and frequency

Biometrics: Physical Attributes vs. Behavioral Patterns – The Privacy Debate Read More »

passwords

Anyone can know your password, but there’s only one you

If the only thing separating a cyber criminal, online stalker or identity thief from your personal data and information is a password or PIN you’ve already lost. There are three primary methods of authentication but “something you know” is the

Anyone can know your password, but there’s only one you Read More »

Office of Personnel Management

The OPM data breach was probably inevitable

Breaches big and small have been in the news, from small organizations losing banking files to global groups like Sony losing seemingly everything to hackers. But with the recent Office of Personnel Management (OPM) hack that was revealed recently, with

The OPM data breach was probably inevitable Read More »

Scroll to Top