As promised last issue, I’m re-printing a glossary of strong/second factor authentication methods that TriCipher provided me along with the results of its sponsored survey on people’s perceptions of ...
Explore different methods for authenticating devices on a network, from hardware addresses to advanced certificate-based ...
The Kerberos authentication method originated at the Massachusetts Institute of Technology in the 1980s, as part of a project called Athena. The project involved integrating the computers on the MIT ...
Authentication determines who gets in and who stays out. Getting this right means fewer breaches, less downtime, and stronger ...
Going passwordless isn’t a switch flip — it’s a full identity rethink. This piece walks through what actually breaks, works ...
In today’s digital age, personal data is never safe. Cybercriminals are looking for every opportunity possible to acquire your user data. Ongoing data breaches continue to expose usernames, passwords, ...
It’s RSA week in San Francisco, so that means lots of announcements, even if they’re only of the “I’m waving so you know I’m still here” variety. I fondly remember one such announcement from a few ...
Microsoft announced that it will disable the 30-year-old NTLM authentication protocol by default in upcoming Windows releases ...
Blockchain firm Lightning Labs drafted the specifications of a new Lightning Network-based authentication system that could replace traditional email-based accounts. According to a March 30 ...
SYDNEY, AUSTRALIA — American customer engagement platform Twilio, Inc. is working with local telecommunications companies (telcos) to launch its silent network authentication (SNA) channel in the ...