Authentication news, information, and how-to advice

2 token authentication locks
keys authentication

hacker endpoint security vulnerability cyberattack lock

How to approach a Zero Trust security model for your enterprise

Implementing a Zero Trust model to protect your enterprise's critical systems could be worth the trouble.

continuous authentication

What is access control? 5 enforcement challenges security professionals need to know

Access controls authenticate and authorize individuals to access the information they are allowed to see and use.

fingerprint scan biometric security system

Baltimore Police to use fingerprint scanning to combat overtime fraud

In light of the Baltimore Police Department’s Gun Trace Task Force scandal, the police will use fingerprint scans to clock in and out of work.

salted hash cms hero th3

Salted Hash Ep 12: Zero trust networks and other things that caught our attention in 2017

This week's episode of Salted Hash is the last one for 2017, so we're closing out the year by talking about security wins, and the incidents that held the attention of our panel. Steve is joined by Akamai's Dave Lewis, Andy Ellis and...

facial recognition - biometric security identification - binary face

Abuse: a new category of threat

There are many different ways for users to abuse accounts, the solutions to which rack up costs and create drag on internal resources. And some fixes may cause more problems than they solve.

continuous authentication

Security myths: modern federation is enough

What exactly is federation and what does it have to do with single sign-on?

Man pointing to security icon for email

DMARC is now an essential part of internet security

Email encryption and authentication standards like DMARC and STARTTLS are becoming essential for closing security gaps.

istock 479801072

3 advanced prevention technologies expected to grow in 2018

New advanced protection technologies will help organizations decrease the attack surface and simplify security operations.

keys authentication

What is two-factor authentication (2FA)? How to enable it and why you should

With Google, Facebook, Instagram, or your own internal accounts, 2FA provides an extra layer of protection that helps keep hackers out.

facial recognition - biometric security identification

Decentralized biometric authentication reshapes mobile payments

Once trust is lost, it’s extremely hard to get it back.

black bears

Multi-factor authentication needs a little Goldilocks

Companies cannot apply multi-factor authentication to everything a user does.

6 password

Ready for more secure authentication? Try these password alternatives and enhancements

Password-only authentication is dead. Combine passwords with multifactor authentication, social login, biometrics, or risk-based authentication to better protect users and your reputation.

hacker login password cliche

How hackers crack passwords and why you can't stop them

Password crackers have access to more stolen passwords and better password hacking software and tools than ever before.

help support advice guidance signpost

Are you giving useful advice?

If you can’t measure it, it’s not actionable. If it’s not actionable, it’s not useful. And if it’s not useful, is it actually advice?

keys authentication

Security Myths: Users hate multifactor authentication

Just stop bludgeoning them with multifactor authentication (MFA).

A look into authentication for the day after passwords

How enterprises can take new steps in two-factor authentication (and finally kill passwords)

discus fish 1943755 1280

Airport security to include face-scanning fish in virtual aquarium tunnel

Say good-bye to airport security lines, and say hello to Smart Tunnels. Dubai airport to use biometric-scanning tunnels for passport control.


What is SAML, what is it used for and how does it work?

The Security Assertion Markup Language (SAML) standard defines how providers can offer both authentication and authorization services. Here's what you need to know.

Load More