Please turn on your JavaScript for this page to function normally.
Unified identity services across data center, mobile and cloud

Tom Kemp is co-founder and CEO of Centrify Corporation, a software and cloud security provider that delivers solutions that centrally control, secure and audit access to …

Zoosk asks users to reset passwords following mass leak

Online dating service Zoosk is urging some of its users to change their passwords following the leaking of a list of some 29 million passwords that seemingly contains theirs. …

Samsung Galaxy devices’ lock screen easily bypassed

This week revealed not one, but two security vulnerabilities that allow anyone to bypass the lock screen on a variety of Samsung Android smatphones. On Monday UK blogger …

Open standards are key for security in the cloud

The current divide between proprietary and open approaches to enterprise cloud computing has implications beyond the obvious. More than just issues of cloud interoperability …

VASCO launches new card reader for transaction signing and PKI applications

VASCO launched DIGIPASS 870, a USB connectable card reader which can be used in both connected and unconnected mode. In connected mode DIGIPASS 870 can be used for a number of …

Yubico launches smart card that combats spying malware

Yubico announced that the Yubikey NEO aggressively defends against malware aimed at smart cards. Successfully piloted by leading enterprises, the new product eliminates the …

Multi-layered authentication appliance from HID Global

HID Global announced its new ActivID Appliance solution for strong authentication at RSA Conference 2013. Enabling organizations to protect corporate data against unauthorized …

Separating single sign-on myths from fact

Single Sign On (SSO), the ability to authenticate only once and have automatic access to many systems, has many potential benefits ranging from lower IT overhead costs to …

Enterprise-class mobility with integrated app SSO from Centrify

At the RSA Conference 2013 in San Francisco, Centrify Corporation announced the general availability of Centrify for Mobile 2013 and Centrify for SaaS 2013, a set of …

Google 2-step login verification flaw allows account hijacking

Duo Security researchers have found an easy way to bypass Google’s two-step login verification by capturing a user’s application-specific password. “To make …

Enterprise account manager with double safekeeping feature

Double safekeeping, or the two-man rule, has long been an established control mechanism for ensuring high levels of security during critical operations because the process …

OAuth flaw allowed researcher full access to any Facebook account

A flaw in Facebook’s OAuth system that allows the communication between applications and users has enabled web application security specialist Nir Goldshlager to gain …

Don't miss

Cybersecurity news