Authentication

Authentication | News, how-tos, features, reviews, and videos

5 password best practices unique passwords authentication
security trust

race compet starting sucess leader prepar challenge

Start preparing today for the future of quantum computing

With so many issues competing for an IT security professional's time, it’s difficult to find time for future planning. That being said, now is the time of professionals to have quantum computing on the radar.

eye retina scanner security identity access management

The best IAM software: Rating the top 10 products

Based on feedback from IT professionals, these are the best identity and access management products. Download the free PDF report to see how they rank from 1 to 10.

facial recognition - biometric security identification

3 IAM deployment models: Which will work for your organization?

Each of the identity and access management platform deployment models--on-premises, cloud and hybrid--has trade-offs and different resource requirements.

Artificial intelligence and digital identity

Is it time to drop our identity to become frictionless?

How the data behind the identity is driving services and will help move us away from knowledge-based verification.

9 screen locking device lock down authentication

The behavioral economics of authentication

Organizations can now implement authentication technologies that improve security and user experience. Consumers just need some nudging to follow along.

wearables workers

Listening-Watch wearable system provides secure 2FA

Listening-Watch, a new wearable two-factor authentication system that uses browser speech sounds, is resilient to proximity and remote attacks.

9 screen locking device lock down authentication

What is WebAuthN? Possibly the answer to all web authentication

With strong support from Google, Microsoft and other vendors, WebAuthN is poised to become a true standard for passwordless authentication over the web.

artificially intelligent [AI] virtual assistant / chatbot

The chatbot revolution will (not) be secure

Two blockchain projects hope to prevent bot authentication issues before they start.

passwords

What is single sign-on? How SSO improves security and the user experience

Password fatigue, cloud sprawl and developer simplicity are pushing the rise of SSO.

credit card fraud

Analyzing user behavior to stop fake accounts

Online account fraud is a big, automated business. NuData Security looks at hundreds of data points to identify malicious login attempts.

job search machine learning ai artifical intelligence robotics automation

What CAPTCHAs can teach us about authentication

Businesses that authenticate users online can learn a lot from a similar challenge: distinguishing robots from humans.

facial recognition - biometric security identification

Identity eats security: How identity management is driving security

New intelligent identity management systems are changing the way organizations authenticate users and devices, and they’re making identity the new security perimeter.

crowd of sports spectators seamless 164455698

Legalizing online sports betting means a new need for security

In the wake of SCOTUS paving the way to legalizing online sports betting in the U.S., states are figuring out the best approach to making it secure with authentication and identity verification.

authentication

What is continuous user authentication? The best defense against fraud

Authenticating all user actions and attributes throughout a session ultimately provides the best defense against fraud and account abuse.

woman phone scam

4 scams that illustrate the one-way authentication problem

These scams rely on tricking consumers into believing they are interacting with a trusted vendor. Here’s how vendors can prevent the scams.

6 password

Ready for more secure authentication? Try these password alternatives and enhancements

Password-only authentication is dead. Combine passwords with multifactor authentication, social login, biometrics, or risk-based authentication to better protect users and your reputation.

user authentication

How to evaluate web authentication methods

Authentication evaluation white paper includes popular and obscure methods and outlines a framework for assessing their security effectiveness.

keys authentication

How risk-based authentication has become an essential security tool

A new generation of risk-based authentication (RBA) products can improve both customer experience and security. Here's what to look for in them.

Load More