October 31, 2017 Photo-Based Pixie 2FA System Takes Authentication to a New Dimension 2 min read - Researchers at Florida International University and Bloomberg have generated a new 2FA system that relies on an individual taking a picture of an object.
Endpoint October 12, 2017 Not Your Father’s Cybersecurity Tips: Think Outside the Box to Protect Your Identity During NCSAM 3 min read - These five cybersecurity tips can help users review and update their online practices to protect their identities from advanced threats.
Identity & Access August 9, 2017 The Untapped Potential of Two-Factor Authentication 3 min read - Two-factor authentication methods are more secure than passwords alone but require widespread adoption to be universally effective.
CISO August 9, 2017 Viewing Cybersecurity From the Consumer’s Perspective 2 min read - In today's complex ecosystem of connected devices, cybersecurity is a key consideration for consumers when shopping for products and services.
Fraud Protection August 7, 2017 Ransomware, Trojans and Fraud, Oh My! Tracking Recent Cybercrime Trends and Patterns 4 min read - As banking and retail institutions adopt stronger security measures, cybercrime trends are shifting to maximize fraudsters' ROI.
July 18, 2017 Google Advances Two-Step Verification 2 min read - Google is changing how it does two-step verification by replacing one-time SMS codes with new features and login protocols.
June 26, 2017 Forgot Password? Man-in-the-Middle Attack Can Perform a Password Reset, Researchers Warn 2 min read - Many high-profile online services are vulnerable to a new type of attack that could enable fraudsters to intercept password reset requests.
June 5, 2017 Facebook Highlights Two-Factor Authentication in Security Settings Redesign 2 min read - Facebook is hoping to make improving security settings easier for users with two-factor authentication and redesigned menu navigation.
Data Protection May 25, 2017 Don’t Leave Home Without These Five Travel Security Tips 3 min read - Tourists should follow these travel security best practices to protect their devices and data from cybercriminals, especially in foreign countries.
Identity & Access March 30, 2017 Shakespeare, the Wizard of Oz and Multifactor Authentication 2 min read - Multifactor authentication, a critical component of identity and access management, has been described in literature since Shakespeare's time.