Authentication

Authentication | News, how-tos, features, reviews, and videos

login password - user permissions - administrative control
keys authentication

Facebook / privacy / security / breach / wide-eyed fear

Hey Facebook: Quit discouraging people from using 2FA

Facebook is spying on user 2FA phone numbers to target them with ads. A non-trivial percentage of Facebook users will not use two-factor authentication as a result, a net loss to security.

passwords

Are long passphrases the answer to password problems?

Passphrases can be more secure than passwords, but there are limitations and hackers will eventually master cracking them.

5 password best practices unique passwords authentication

The best password advice right now

Short and crackable vs. long, complex and prone to reuse? The password debate rages on.

security trust

5 steps to create a zero trust security model

A clear plan and willingness to change are critical to successfully moving to a zero trust environment.

race compet starting sucess leader prepar challenge

Start preparing today for the future of quantum computing

With so many issues competing for an IT security professional's time, it’s difficult to find time for future planning. That being said, now is the time of professionals to have quantum computing on the radar.

eye retina scanner security identity access management

The best IAM software: Rating the top 10 products

Based on feedback from IT professionals, these are the best identity and access management products. Download the free PDF report to see how they rank from 1 to 10.

facial recognition - biometric security identification

3 IAM deployment models: Which will work for your organization?

Each of the identity and access management platform deployment models--on-premises, cloud and hybrid--has trade-offs and different resource requirements.

Artificial intelligence and digital identity

Is it time to drop our identity to become frictionless?

How the data behind the identity is driving services and will help move us away from knowledge-based verification.

9 screen locking device lock down authentication

The behavioral economics of authentication

Organizations can now implement authentication technologies that improve security and user experience. Consumers just need some nudging to follow along.

wearables workers

Listening-Watch wearable system provides secure 2FA

Listening-Watch, a new wearable two-factor authentication system that uses browser speech sounds, is resilient to proximity and remote attacks.

9 screen locking device lock down authentication

What is WebAuthN? Possibly the answer to all web authentication

With strong support from Google, Microsoft and other vendors, WebAuthN is poised to become a true standard for passwordless authentication over the web.

artificially intelligent [AI] virtual assistant / chatbot

The chatbot revolution will (not) be secure

Two blockchain projects hope to prevent bot authentication issues before they start.

passwords

What is single sign-on? How SSO improves security and the user experience

Password fatigue, cloud sprawl and developer simplicity are pushing the rise of SSO.

credit card fraud

Analyzing user behavior to stop fake accounts

Online account fraud is a big, automated business. NuData Security looks at hundreds of data points to identify malicious login attempts.

job search machine learning ai artifical intelligence robotics automation

What CAPTCHAs can teach us about authentication

Businesses that authenticate users online can learn a lot from a similar challenge: distinguishing robots from humans.

facial recognition - biometric security identification

Identity eats security: How identity management is driving security

New intelligent identity management systems are changing the way organizations authenticate users and devices, and they’re making identity the new security perimeter.

crowd of sports spectators seamless 164455698

Legalizing online sports betting means a new need for security

In the wake of SCOTUS paving the way to legalizing online sports betting in the U.S., states are figuring out the best approach to making it secure with authentication and identity verification.

authentication

What is continuous user authentication? The best defense against fraud

Authenticating all user actions and attributes throughout a session ultimately provides the best defense against fraud and account abuse.

Load More