• Infographic: Mapping the Path of Two-Factor Authentication

    Within the enterprise realm, two-factor authentication has become more than just an option — it’s now an indispensable asset. By implementing an additional authentication wall, a company takes a vital proactive step toward making the business infrastructure safe from a malicious intrusion. However, there is an important distinction to be made between the two types of authentication tokens organizations use, as illustrated by an Entrust informational graphic:

        in Authentication
    0
  • Does RSA understand what happened to them?

    Blogmaster Note: This was originally posted on January 18,  2012 to ComputerWorld UK’s Security Spotlight Blog . This was not just an attack on RSA, it was an attack on all of us. In Tim Greene’s article, “RSA security breach has silver lining, says CEO,” he quotes Art Coviello as saying “…we were able to minimise the damage…” and that

        in General, Identity Assurance
    0
  • RSA got you down, Maybe it’s time to Trade Up!

    As we all have seen in the media, as well as heard from our customers, cyberthreats are an escalating problem for enterprises, financial institutions, governments and even individuals. These threats are as basic or as sophisticated as necessary to perpetrate the desired outcome of those doing the attacks.

        in Identity Assurance
    0