Identity & Access February 21, 2017 IAM Feeling Good? What CISOs Should Know About the Feeling of Identity and Access Management Solutions 4 min read - Identity and access management (IAM) is critical, but an inconvenient authentication process makes for a lousy user experience.
Identity & Access January 30, 2017 Two-Factor Authentication: A Little Goes a Long Way 3 min read - Online services are understandably reluctant to add steps to the login process, but a little two-factor authentication can significantly boost security.
December 28, 2016 Google Is Ga-Ga Over Security Key 2 min read - Google's new Security Key protects users more effectively than simple two-factor authentication (2FA) without the added cost of smart hardware.
December 21, 2016 The Move to Multifactor Authentication: Are Passwords Past Their Prime? 2 min read - According to a recent survey, 93 percent of organizations use multifactor authentication to protect user accounts and corporate networks from cybercrooks.
Identity & Access November 14, 2016 Cybercriminals Are Getting Better at Using Advanced Authentication Methods 2 min read - Cybercriminals are becoming more advanced and learning how to leverage the latest authentication methods to exploit security weaknesses.
Identity & Access November 11, 2016 Security Starts With People: What it Takes to Ensure Simple Yet Strong Authentication on Mobile 3 min read - IT professionals and mobile app developers must figure out a way to implement strong authentication capabilities without complicating the user experience.
Identity & Access September 7, 2016 What’s Wrong With SMS Authentication? Two IBM Experts Weigh In on the NIST Recommendation 4 min read - IBM experts Dustin Hoff and Ashish Malhotra discussed ways for businesses and end users to mitigate security issues stemming from SMS authentication.
July 28, 2016 SMS Two-Factor Authentication: Time to Trash the Text? 2 min read - Just like software or network defense, cybercriminals have found ways to circumvent and compromise SMS two-factor authentication.
July 19, 2016 Phone Verification May Not Catch Premium Number Costs 2 min read - Belgium-based bug bounty hunter Arne Swinnen exploited holes in the phone verification services offered by Instagram, Google and Microsoft.
May 27, 2015 Effectiveness of Security Questions Called Out in New Study 3 min read - The effectiveness of security questions has been called out in a new Google study. Are user answers really as unique as they ought to be?