Tag Archives: authentication

Did Google Miss the Mark With Push To Make Passwords Obsolete?

December 2, 2013 by Chris Taylor     No Comments

On Saturday, Forbes discussed Google’s 2014 vision to make user-generated passwords obsolete. It’s an initiative that deserves praise and is long overdue. Someone is finally taking strong authentication and identity-based security seriously — particularly in the consumer space. It does, however, come with some caveats. Google is demonstrating that identity-based security solutions are available for [Read More...]

Filed Under: Enterprise Authentication Tagged With: gmail, Google, passwords

The Way Forward

August 14, 2013 by Bill Conner     No Comments

The title may come across a little more literary than a normal technology or security blog, but this is what I want to discuss: the way forward in security software. Cybersecurity is a market in flux. And, from where I sit, the way forward is simple and hinges on three things. Mobile a key market [Read More...]

Filed Under: Cloud, Identity Assurance, Mobility Tagged With: Cloud, growth, innovation

What is Driving Growth in the Authentication Market?

August 8, 2013 by Bill Conner     No Comments

I recently read an article that pegged the global growth rate for multifactor authentication at 17 percent. This is a substantial compound annual growth rate (CAGR) when you take into consideration the size of the market and the nascent growth of some key players. Then I considered Entrust’s relative position in the market and in [Read More...]

Filed Under: Cloud, Identity Assurance, Mobility Tagged With: Cloud, growth, innovation

Mobile Smart Credentials — Multipurpose Digital Identities for improved Security AND User Convenience

October 24, 2012 by Mike Byrnes     No Comments

Today, Entrust announced the commercial release of the Entrust IdentityGuard Mobile Smart Credential — a solution that transforms a smartphone into a multipurpose digital identity.

A Framework Approach to Authentication and Identity & Access Management

May 23, 2012 by David Mahdi     No Comments

Around a decade ago, I remember thinking of what it would be like if vendors kept pumping out point solutions to solve each individual problem. Luckily, that trend is not as bad as I may have thought — although I still see many vendors pushing hard for individual point solutions. Is this truly what customers [Read More...]

Layered Security for Mobile Banking

May 8, 2012 by Mike Byrnes     No Comments

American Banker published a great article last week covering some of JPMorgan’s security strategies for mobile banking. Lloyd O’Conner explained the importance of layering multiple security technologies to protect their clients — as well as their own company — from the growing cyberthreats that not only target the online channel but are zoning in on [Read More...]

Filed Under: Fraud, Identity Assurance Tagged With: biometrics, Business, fraud

Authentication After the RSA breach: Sticking to Hard Tokens Could be a Mistake

September 20, 2011 by Bill Conner     No Comments

Blogmaster Note: This was originally posted on September 20, 2011 to the ComputerWorld UK Security Blog. The role of authentication as part of the CISO’s armory has been subject to some serious debate in recent months. In the wake of the RSA data breach, and the subsequent news of customers’ compromised data, the ability of [Read More...]

No such thing as a free lunch… particularly when dealing with a security breach.

July 25, 2011 by Mike Byrnes     No Comments

As most of you are well aware, as a remedy to try and help its customers, RSA is offering “free” tokens to replace their compromised devices.  Well, they’re really not free tokens; what RSA is willing to do is provide a new token with a limited-time license based on the remaining life span of a customer’s compromised [Read More...]

Filed Under: Identity Assurance Tagged With: bank fraud, RSA

Are you into BYOD?

July 20, 2011 by David Mahdi     No Comments

Today’s identities go well beyond people and how we traditionally think of identities. The number of people identities will be dwarfed in the next five years by device and application identities. How is your organization planning on dealing with the consumerization of the IT infrastructure?

Entrust Webcast: Leveraging Mobile Devices for Strong Authentication

July 18, 2011 by David Mahdi     No Comments

Security-conscious organizations and enterprises are finding it increasingly difficult to secure various mobile devices that flood corporate networks. With handheld devices heavily leveraged to access corporate networks and sensitive information, CIOs must consider their authentication strategies for any number of evolving channels.