authentication
Open standards are key for security in the cloud
The current divide between proprietary and open approaches to enterprise cloud computing has implications beyond the obvious. More than just issues of cloud interoperability …
VASCO launches new card reader for transaction signing and PKI applications
VASCO launched DIGIPASS 870, a USB connectable card reader which can be used in both connected and unconnected mode. In connected mode DIGIPASS 870 can be used for a number of …
Yubico launches smart card that combats spying malware
Yubico announced that the Yubikey NEO aggressively defends against malware aimed at smart cards. Successfully piloted by leading enterprises, the new product eliminates the …
Multi-layered authentication appliance from HID Global
HID Global announced its new ActivID Appliance solution for strong authentication at RSA Conference 2013. Enabling organizations to protect corporate data against unauthorized …
Separating single sign-on myths from fact
Single Sign On (SSO), the ability to authenticate only once and have automatic access to many systems, has many potential benefits ranging from lower IT overhead costs to …
Enterprise-class mobility with integrated app SSO from Centrify
At the RSA Conference 2013 in San Francisco, Centrify Corporation announced the general availability of Centrify for Mobile 2013 and Centrify for SaaS 2013, a set of …
Google 2-step login verification flaw allows account hijacking
Duo Security researchers have found an easy way to bypass Google’s two-step login verification by capturing a user’s application-specific password. “To make …
Enterprise account manager with double safekeeping feature
Double safekeeping, or the two-man rule, has long been an established control mechanism for ensuring high levels of security during critical operations because the process …
OAuth flaw allowed researcher full access to any Facebook account
A flaw in Facebook’s OAuth system that allows the communication between applications and users has enabled web application security specialist Nir Goldshlager to gain …
ESET releases two-factor authentication software solution
ESET announced the availability of ESET Secure Authentication, a two-factor authentication (2FA) software solution for SMBs that makes use of remote end-users’ mobile …
Google account hijacking dramatically reduced
Google employs many security measures to thwart would-be Google account hijackers, and not all are highly visible as the two-factor authentication option introduced in 2010 …
Security is top reason why IT adopts single sign-on
Security is the number one reason why IT professionals implement single sign-on (SSO) and identity and access management (IAM) technology, according to new research from …
Featured news
Resources
Don't miss
- Resecurity introduces AI-powered GSOC at NATO Edge 2024
- Windows, macOS users targeted with crypto-and-info-stealing malware
- How to choose secure, verifiable technologies?
- December 2024 Patch Tuesday forecast: The secure future initiative impact
- Building a robust security posture with limited resources