Identity & Access September 7, 2016 What’s Wrong With SMS Authentication? Two IBM Experts Weigh In on the NIST Recommendation 4 min read - IBM experts Dustin Hoff and Ashish Malhotra discussed ways for businesses and end users to mitigate security issues stemming from SMS authentication.
July 28, 2016 SMS Two-Factor Authentication: Time to Trash the Text? 2 min read - Just like software or network defense, cybercriminals have found ways to circumvent and compromise SMS two-factor authentication.
Identity & Access July 27, 2016 The Rise of the Selfie Authentication as a New Security Factor 2 min read - Many online vendors are moving toward more innovative and secure methods of confirming a user's identity, including selfie authentication.
July 19, 2016 Phone Verification May Not Catch Premium Number Costs 2 min read - Belgium-based bug bounty hunter Arne Swinnen exploited holes in the phone verification services offered by Instagram, Google and Microsoft.
Identity & Access July 12, 2016 The Insider Threat: Are You at Risk? 4 min read - Some security red flags, such as the presence of shadow IT and weak authentication practices, could indicate a high risk for an insider threat.
Identity & Access May 6, 2016 The Evolution of Voice Authentication as a Security Method 2 min read - Voice authentication has the potential to alter the security industry, but the access method comes with some drawbacks that should be considered.
Application Security October 20, 2015 Making Security Best Practices More Viable 2 min read - When it comes to security best practices, there is an ocean of difference between the average security expert and the common user.
Identity & Access October 5, 2015 A Progress Report on FIDO Authentication 2 min read - The Fast Identity Online (FIDO) Alliance is dedicated to improving authentication standards across industries and applications.
Fraud Protection September 24, 2015 Authentication: The Enterprise’s Weakest Link 3 min read - Many organizations struggle to find the right authentication methods for their employees and needs, but they can ill afford to let malpractice continue.
Identity & Access August 27, 2015 Can Selfies Be the Next Multifactor Authentication Method? 2 min read - Several companies are implementing new forms of multifactor authentication to prevent fraud, but how realistic and effective are these technologies?