Have you ever come across something years old that is so dead on about a topic important to you that you can’t believe you didn’t know it existed? I felt that way when I stumbled across an excellent ...
As promised last issue, I’m re-printing a glossary of strong/second factor authentication methods that TriCipher provided me along with the results of its sponsored survey on people’s perceptions of ...
Today’s relentless online criminals have made it necessary to not only employ multifactor authentication in securing IT networks and apps, but to make sure that such authentication can also be ...
It may have been drawn two decades ago, but the old New Yorker cartoon still rings true: "On the Internet, nobody knows you're a dog." "It's really easy to be whoever you want to be on the Internet," ...
Gartner has predicted increasing use of biometric authentication for access to enterprise networks or high-value Web applications from smartphones or tablets, and Allan expects to see increasing ...
Explore different authentication provider types (social, passwordless, MFA) and learn best practices for choosing the right one to enhance security and user experience in your applications.