As much as our digital ecosystem has advanced in recent years, some elements of the security world have been slower to change. For example, a shortage of well-trained cybersecurity professionals has ...
As promised last issue, I’m re-printing a glossary of strong/second factor authentication methods that TriCipher provided me along with the results of its sponsored survey on people’s perceptions of ...
As a further consequence of data breaches, the loss of employee data loss doesn’t just impact the employee; it can also cause measurable harm to the employer. Learn how impactful such a breach could ...
Breakthroughs, discoveries, and DIY tips sent six days a week. Terms of Service and Privacy Policy. “Where did I leave the spare key to my email account?” is a ...
Voice authentication seemed convenient—until AI made it a security disaster. What was already a flawed security method has become dangerously unreliable, and most people don't realize how vulnerable ...
Version two of the Secure Shell protocol implements a flexible authentication and authorization system. Smart cards, one-time passwords, Kerberos, public-key authentication and other methods may be ...