authentication
UGNazi attack 4chan, CloudFlare
Visitors to 4chan have recently been automatically redirected to the Twitter account of hacker group UGNazi, and an investigation into the matter revealed that the attack has …
AuthenTec releases Eikon mini USB fingerprint reader
AuthenTec introduced the Eikon mini USB fingerprint reader. The ergonomically designed Eikon mini integrates AuthenTec’s AES2660 smart fingerprint sensor and was …
(IN)SECURE Magazine issue 34 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 34 has been released today. Table of contents: …
Birdstep unveils SafeMove SSL VPN
Birdstep launched its SafeMove Clientless SSL VPN, offering easy, secure and efficient remote access to the enterprise network. While Birdstep’s full SafeMove Mobile VPN …
SaaSID launches Cloud Application Manager
SaaSID unveiled Cloud Application Manager (CAM), security software that provides single sign on (SSO), application shaping and auditing of any applications accessed using a …
LOK-IT Secure Flash Drive
After a couple of years of research and development, LOK-IT was announced at the RSA Conference 2011 in San Francisco. The product boasted a unique concept of PIN-based …
Password creation policies are the enemy of secure passphrases
Commenting on reports that a security developer has concluded that password-creation policies are the enemy of secure passwords, SecurEnvoy co-founder Steve Watts says that …
Facial recognition technology for user authentication
DigitalPersona announced the latest release of its enterprise software which builds upon its existing support for a wide variety of user authentication methods by including …
Intel strengthens security of its Core vPro platform
Intel announced the availability of its 3rd Generation Intel Core vPro processor-based platforms for business and intelligent systems. New capabilities embed security at every …
The creation and evolution of the superuser
When I think about managing identities and privileges within an organisation, one of my favorite analogies for the whole privileged identity lifecycle is biblical. Everything …
Encrypted flash drive with two-factor authentication
GoldKey announced its line of GoldKey Tokens with Built-In Flash that provide hardware-encrypted secure flash along with a built-in Smart Card and GoldKey’s enhanced …
Americans are less concerned about security
Americans are less concerned about nearly all aspects of security than they were 12 months ago, but an overwhelming majority consider security issues very important when …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits