authentication
Voice biometrics for mobile devices
Nuance announced Dragon ID, a voice biometrics technology that lets people quickly and easily unlock mobile devices and consumer electronics just by using their voice. Dragon …
UGNazi attack 4chan, CloudFlare
Visitors to 4chan have recently been automatically redirected to the Twitter account of hacker group UGNazi, and an investigation into the matter revealed that the attack has …
AuthenTec releases Eikon mini USB fingerprint reader
AuthenTec introduced the Eikon mini USB fingerprint reader. The ergonomically designed Eikon mini integrates AuthenTec’s AES2660 smart fingerprint sensor and was …
(IN)SECURE Magazine issue 34 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 34 has been released today. Table of contents: …
Birdstep unveils SafeMove SSL VPN
Birdstep launched its SafeMove Clientless SSL VPN, offering easy, secure and efficient remote access to the enterprise network. While Birdstep’s full SafeMove Mobile VPN …
SaaSID launches Cloud Application Manager
SaaSID unveiled Cloud Application Manager (CAM), security software that provides single sign on (SSO), application shaping and auditing of any applications accessed using a …
LOK-IT Secure Flash Drive
After a couple of years of research and development, LOK-IT was announced at the RSA Conference 2011 in San Francisco. The product boasted a unique concept of PIN-based …
Password creation policies are the enemy of secure passphrases
Commenting on reports that a security developer has concluded that password-creation policies are the enemy of secure passwords, SecurEnvoy co-founder Steve Watts says that …
Facial recognition technology for user authentication
DigitalPersona announced the latest release of its enterprise software which builds upon its existing support for a wide variety of user authentication methods by including …
Intel strengthens security of its Core vPro platform
Intel announced the availability of its 3rd Generation Intel Core vPro processor-based platforms for business and intelligent systems. New capabilities embed security at every …
The creation and evolution of the superuser
When I think about managing identities and privileges within an organisation, one of my favorite analogies for the whole privileged identity lifecycle is biblical. Everything …
Encrypted flash drive with two-factor authentication
GoldKey announced its line of GoldKey Tokens with Built-In Flash that provide hardware-encrypted secure flash along with a built-in Smart Card and GoldKey’s enhanced …
Featured news
Resources
Don't miss
- Webinar: Beyond the Quadrant: An Analyst’s Guide to Evaluating Email Security in 2026
- CISO Assistant: Open-source cybersecurity management and GRC
- Firmware scanning time, cost, and where teams run EMBA
- How AI image tools can be tricked into making political propaganda
- Product showcase: Orbot – Tor VPN for iOS