authentication
LOK-IT Secure Flash Drive
After a couple of years of research and development, LOK-IT was announced at the RSA Conference 2011 in San Francisco. The product boasted a unique concept of PIN-based …
Password creation policies are the enemy of secure passphrases
Commenting on reports that a security developer has concluded that password-creation policies are the enemy of secure passwords, SecurEnvoy co-founder Steve Watts says that …
Facial recognition technology for user authentication
DigitalPersona announced the latest release of its enterprise software which builds upon its existing support for a wide variety of user authentication methods by including …
Intel strengthens security of its Core vPro platform
Intel announced the availability of its 3rd Generation Intel Core vPro processor-based platforms for business and intelligent systems. New capabilities embed security at every …
The creation and evolution of the superuser
When I think about managing identities and privileges within an organisation, one of my favorite analogies for the whole privileged identity lifecycle is biblical. Everything …
Encrypted flash drive with two-factor authentication
GoldKey announced its line of GoldKey Tokens with Built-In Flash that provide hardware-encrypted secure flash along with a built-in Smart Card and GoldKey’s enhanced …
Americans are less concerned about security
Americans are less concerned about nearly all aspects of security than they were 12 months ago, but an overwhelming majority consider security issues very important when …
Fingerprint sensor for secure mobile payments
AuthenTec introduced a new smart fingerprint sensor tailored for mCommerce applications requiring strong but effortless security in today’s NFC-equipped smartphones and …
NetIQ minimizes the risk of unauthorized access
Organizations struggle with managing and reporting on end user access and entitlements to meet monthly or quarterly reporting audit cycles and protect corporate information. …
Audited way to reset or unlock domain account passwords
Lieberman Software released Account Reset Console 6.0, which permits delegated users to reset their own passwords and unlock their own accounts without involving IT staff, …
Entitlement administration and governance
In the identity and access management (IAM) market, we’ve got the terminology all wrong. With bad labels comes misdirected thinking, which ultimately contributes to …
BYOT: Bring Your Own Token
SecurEnvoy revealed details of its latest release that gives users full flexibility of the device they use, while ensuring complete security to the organization. At the click …
Featured news
Resources
Don't miss
- Henkel CISO on the messy truth of monitoring factories built across decades
- The hidden dynamics shaping who produces influential cybersecurity research
- UTMStack: Open-source unified threat management platform
- LLMs are everywhere in your stack and every layer brings new risk
- Building SOX compliance through smarter training and stronger password practices