Biometric technologies for Android

Neurotechnology announced their new line of embedded biometric technologies, including VeriFinger Embedded SDK for fingerprint biometrics, VeriLook Embedded SDK for face …

Single packet authorization and port knocking

fwknop implements an authorization scheme called Single Packet Authorization (SPA). This method of authorization is based around a default-drop packet filter (fwknop supports …

Exostar updates identity management solution

Exostar, whose cloud-based solutions enable secure business-to-business collaboration, announced it has expanded its Managed Access Gateway (MAG) identity management service …

Top 5 authentication predictions for 2012

Confident Technologies offers their top 5 authentication predictions for 2012. They include authentication trends that they think will emerge next year, as well as some …

Yahoo! Mail now with second sign-in verification

More than a year after Google rolled out 2-factor authentication for its Gmail service, Yahoo! is finally beginning to add the option for its users. Owners of a Yahoo! Account …

The risks of unauthorized access

HP unveiled new global research that reports increased threats to sensitive and confidential workplace data are created by a lack of control and oversight of privileged users, …

Pros losing confidence in hard tokens

Almost a quarter of organizations, 23%, have suffered a security breach as a result of identity fraud which was linked to a lost or stolen authentication device, according to …

Centralized management of Mac users

Centrify announced a new release of Centrify DirectControl for Mac OS X, a solution for Active Directory-based authentication, single sign-on, smartcard and group policy …

Personal electronic signatures for everyone

DocuSign Ink helps consumers finish personal business faster by eliminating once and for all the hassles and costs of printing, faxing, scanning, and overnighting signed …