The Latest in IT Security

Posts Tagged ‘access control’

The idea is a good one: Use the cellphone camera to take a selfie and employ it as another login authentication credential. Both MasterCard and LogMeOnce have introduced a type of selfie authentication.

Read more ...

The National Institute for Standards and Technology (NIST) has released a Digital Authentication Guideline draft proposing that all services abandon SMS-based two-factor authentication and use tokens and software cryptographic authenticators. Because messages can be redirected to a VoIP service and not an actual mobile number, NIST believes SMS-enabled two-factor authentication is vulnerable to attacks. A […]

Read more ...

Over the past few years the issue of cyber-security and the threat of hackers stealing data has increased tenfold. Not a day goes by without a breach being reported of a retailer losing the credit card details, passwords or login information of thousands of customers. As these attacks become more sophisticated, so does the defence […]

Read more ...


Categories

THURSDAY, MARCH 20, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments