Strong Authentication has become an issue of "risk management." Traditionally, authentication has been a binary problem with a binary answer -- you are or are not authenticated. But recent "guidance" ...
The separation of environments and the management of identities (i.e., service accounts, user accounts, administrative, etc.) are being taken up under the auspices of entitlements management in more ...
Organizations around the world depend on properly implemented identity and access management solutions to secure their data and resources. Work staff, customers and business partners all need ...
/zimages/4/28571.gif For a list of all the winners and finalists of the fifth annual eWEEK Excellence Awards, click here. RSA Securitys (www.rsasecurity.com) RSA Federated Identity Manager is a ...
Risk-based authentication (RBA), also called adaptive authentication, has come of age, and it couldn’t happen fast enough for many corporate security managers. As phishing and account takeovers have ...
Perhaps one day in the future we will no longer have to fumble with passwords when logging into sites and services. In the meantime, passwords rule the day, and you can make them more secure by ...
Nok Nok Labs officially opened its doors today to introduce client/server-based technology proposed as an innovative foundation for flexible, strong multi-factor security that can be used in ...
Increased online fraud and new industry regulations are driving companies to search for stronger authentication methods. The problem is there’s little agreement on the best authentication method or ...
Question: What is the difference between identity verification and authentication? Shai Cohen, senior vice president of global fraud solutions, TransUnion: As more services shift to a virtual format, ...