DataLocker, Inc., a leader in hardware-encrypted data protection, today announced that its flagship Sentry 5 encrypted USB ...
This publication presents a methodology for assigning authentication strengths based on the strength of pair wise bindings between the five entities involved in smart card based authentications. Smart ...
The Smart Card Alliance Healthcare Council is urging the use of two-factor authentication with smart card technology as a way to protect against medical identity theft. According to a recent Ponemon ...
When creating an access control system, it is important to remember that there is no single, correct solution — there are combinations of solutions. However, when it comes to security, there is no ...
Axalto last week offered up a smart card based on Microsoft’s .Net technology, which could make it easier for corporations adopting .Net for Web services to develop card-based security. Axalto last ...
There are now billions of EMV-enabled cards in the world, but they are not foolproof and can be made more secure through new authentication technologies. In most retailers today, customers don’t swipe ...
Virtually every day another news story highlights the importance of network security – corporate networks are breached, databases are accessed by unauthorized individuals, and identities are stolen ...
VeriSign, Inc., (Nasdaq: VRSN), the leading provider of intelligent infrastructure services for Internet and telecommunications networks, today announced it will enhance its strong authentication ...
ACS reports that is has received orders for more than 60,000 PC smart card readers for use in two-factor authentication by Hong Kong banks. Nine banks are deploying the readers for use with the Hong ...
does anyone know of a how-to or something that teaches you how to implement a smart card authentication system for a win2k3 server?<BR><BR>lemme qualify this...<BR><BR>is there any way to use a ...
Years before Steve Jobs showed off the first iPhone, the BlackBerry was already the must-have accessory for mobile professionals. Back then, nobody was worried about watching movies or playing the ...
Basic identity management processes must get better. In an apprehensive society, we’ll be more identified and authenticated than ever before. We’ll be carded, asked for our personal identification ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results