+1-888-690-2424
  • Software Tokens: Simplifying Digital Security

    Picture this scenario: you left your apartment for a business trip, and are sitting on the plane ready to take off when you realize you are missing something. You rummage through your carryon bag, when it hits you: you have left your hardware security token sitting on top of your bureau.  How are you going to log into your bank

        in Identity Assurance, Mobility
    0
  • Are Biometrics the Answer?

    As organizations and individuals continue to look for ways to ensure the security of digital information and move away from a world of passwords, one option that has been tossed around for several years includes the collection and analysis of specific human body characteristics. Eye retina scans, fingerprints and voice samples are all examples of a type of security system

        in Identity Assurance
    0
  • Not All Multifactor Authentication Techniques are Equal

    Not all multifactor authentication techniques are equal. This seems to be lost on some who are responsible for security architecture. One of my reflections on this past summer is that not everyone is aware of the difference between weaker and stronger forms of multifactor authentication. And you may be surprised what form of security they wanted to use.

        in Identity Assurance, Fraud, Malware, Mobility
    0
  • Passwords Too Weak for Today’s Digital World

    Think of all of the websites that you utilize online that require passwords to protect your sensitive information. You have a password for your online bank account, your email, your credit card accounts — the list goes on. Out of all of those websites, however, how many unique passwords do you have? Not too many? If a hacker deciphers even

        in Identity Assurance, Mobility
    0
  • Not All Multifactor Authentication Techniques are Equal

    Not all multifactor authentication techniques are equal. This seems to be lost on some who are responsible for security architecture. One of my reflections on this past summer is that not everyone is aware of the difference between weaker and stronger forms of multifactor authentication. And you may be surprised what form of security they wanted to use.

        in Identity Assurance, Fraud, Malware, ...
    0
  • Passwords Too Weak for Today’s Digital World

    Think of all of the websites that you utilize online that require passwords to protect your sensitive information. You have a password for your online bank account, your email, your credit card accounts — the list goes on. Out of all of those websites, however, how many unique passwords do you have? Not too many? If a hacker deciphers even

        in Identity Assurance, Mobility
    0
Page 10 of 24««...5...91011...1520...»»