As promised last issue, I’m re-printing a glossary of strong/second factor authentication methods that TriCipher provided me along with the results of its sponsored survey on people’s perceptions of ...
As much as our digital ecosystem has advanced in recent years, some elements of the security world have been slower to change. For example, a shortage of well-trained cybersecurity professionals has ...
Remember when hardware tokens and complex passwords were the only ways to deliver secure access? Today, mobile and cloud applications are driving demand for convenient authentication methods to serve ...
Multi-factor authentication (MFA) is becoming a mandatory security requirement for all businesses across all sectors. The most recent example is the new version of ...
Authenticating users who log onto your network by account name and password only is the simplest and cheapest (and thus still the most popular) means of authentication. However, companies are ...
Multi-factor authentication software protects customer accounts from unauthorized access and data breaches. The right platform stops account takeovers while making login easy for legitimate users.
Results that may be inaccessible to you are currently showing.
Hide inaccessible results