For years, open standards have been the focal point of creating an identity and access control environment that can scale to the size of the ever-growing Internet. Separate consortia and alliances ...
Businesses are continuing to rely on passwords, and those that are implementing additional authentication factors are choosing outdated options like static questions and SMS codes that leave them ...
As promised last issue, I’m re-printing a glossary of strong/second factor authentication methods that TriCipher provided me along with the results of its sponsored survey on people’s perceptions of ...
eSpeaks’ Corey Noles talks with Rob Israch, President of Tipalti, about what it means to lead with Global-First Finance and how companies can build scalable, compliant operations in an increasingly ...
Almost every compromised Microsoft account lacks multi-factor authentication, but few organizations enable it even though it's available, according to Microsoft. In the tech giant's new Cyber Signals ...
A couple of weeks ago, we outlined some of the concerns users have about the security of VPNs for corporate use, and some readers have written in saying that their concerns aren’t necessarily about ...
Identity theft and online fraud are forcing financial institutions, governments and other organizations to quickly find ways to improve Internet security. In October 2005, the Federal Financial ...