authentication

authentication

Layered Authentication Key to Securing Mobile Transactions

It’s official, SMS one time passcodes (OTPs) are on their way out. NIST has issued draft national recommendations that deprecate SMS-based two factor authentication (2FA) and encourage the use of alternative authentication factors. This is not a surprise, rather an …

Layered Authentication Key to Securing Mobile Transactions Read More »

asteroid

Security Experts Offer Advice to Avoid a ‘Near Miss’

Outer space is a huge, vast expanse of emptiness. There are endless numbers of asteroids and other debris zooming through the galaxy at blazing speed, and every once in a while one of them somehow manages to crash into our …

Security Experts Offer Advice to Avoid a ‘Near Miss’ Read More »

Do Not Enter

Your Access Controls Are Broken: Why You Need an Approach Based on Risk

Computer and network security is not a new concept by any stretch of the imagination—but perhaps that is the crux of the problem. The traditional security model and tools that companies have relied on for over a decade are showing …

Your Access Controls Are Broken: Why You Need an Approach Based on Risk Read More »

key

Stronger Security Requires Advanced Authentication

With every new data breach, the digital citizenry becomes more aware that online activities aren’t necessarily private or secure. Whether you’re an adult looking for undercover dalliances on Ashley Madison or a child playing games online with VTech digital learning …

Stronger Security Requires Advanced Authentication Read More »

passwords

Anyone can know your password, but there’s only one you

If the only thing separating a cyber criminal, online stalker or identity thief from your personal data and information is a password or PIN you’ve already lost. There are three primary methods of authentication but “something you know” is the …

Anyone can know your password, but there’s only one you Read More »

Scroll to Top