With the most recent draft of its Digital Identity Guidelines, NIST revised many of its federal recommendations regarding passwords and access management.
If you're writing down your passwords on adhesive notes or in a journal, you might need a refresher on password security best practices.
It's crucial to protect your Twitter account to avoid exposing yourself or your business to financial, reputational and legal consequences.
Fraudsters have rendered traditional authentication factors — something you know, something you have and something you are — ineffective.
Multifactor authentication, a critical component of identity and access management, has been described in literature since Shakespeare's time.
User education and online safety training can be invaluable weapons against cyberthreats, especially for IT teams that are short on resources.
IAM Feeling Good? What CISOs Should Know About the Feeling of Identity and Access Management Solutions
Identity and access management (IAM) is critical, but an inconvenient authentication process makes for a lousy user experience.
By reusing passwords across multiple services, users make it easier for cybercriminals to breach all their accounts, not to mention company databases.
Online services are understandably reluctant to add steps to the login process, but a little two-factor authentication can significantly boost security.
A 6-year-old child ordered $250 worth of merchandise by using her sleeping mother's fingerprint to satisfy her phone's authentication requirements.