The Latest in IT Security

Posts Tagged ‘authentication’

Here’s a polarizing question: is a phone a second factor, in the context of two-factor authentication? Fellow infosec pro @johnnysunshine tweeted the above last week, and sparked a lively debate. Before answering the question, let’s back up a bit and explain two-factor authentication (or 2fa). To borrow an analogy I first used two years ago: […]

Read more ...

“Humans suck at choosing passwords,” writes security pundit Graham Cluley. That is hard to argue according to SplashData (TeamsID), which reported on 2015’s worst passwords, with 123456 and password ranking as the most commonly used passwords. “In SplashData’s fifth annual report, compiled from more than 2 million leaked passwords during the year, some new and […]

Read more ...

When it comes to information and communication technology, the more convenient, the better. Users want to have a plethora of features available to them at the touch of a screen – or better yet, with a quick vocal command. Digital personal assistants have significantly improved the mobile user experience by allowing people to make phone […]

Read more ...


Categories

MONDAY, MARCH 17, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments