Biometric authentication is poised to dethrone the password as the security method of choice. But does consumer confidence equate to long-term security?
New partner integrations for IBM Security Access Manager are now available via IBM Security App Exchange.
IBM is partnering with leading authentication providers to make it easier to integrate new authentication technologies with IBM Security Access Manager.
IT decision-makers need to evolve beyond two-factor authentication and design new ways to make the user verification process intelligent and risk-aware.
According to a recent paper, threat actors are abusing the code signing process associated with public key infrastructure and evading antivirus detection.
The Face ID component is one of the most compelling new features of the iPhone X. Is facial recognition the future of authentication for the enterprise?
Security professionals need an identity and access management solution that delivers single sign-on capabilities and can adapt to business change.
These five cybersecurity tips can help users review and update their online practices to protect their identities from advanced threats.
Blockchain technology enables all participants in a transaction to validate whether the assets involved have been altered or tampered with.
In its new guidelines on secure password practices, NIST recommended using long strings of random words instead of a combination of characters and symbols.