Authentication has been a part of digital life since MIT set up a password on their shared-access computer in 1961. Today, authentication covers virtually every interaction you can have on the ...
Explore various types of authentication methods including MFA, SSO, and Biometrics. Learn how to secure enterprise apps and prevent data breach.
As passwords routinely fail to protect users, multi-factor authentication (MFA) is fast emerging as the new gold standard of cybersecurity. By adding extra layers of protection, MFA is able to block ...
Corporate networks have not only grown in size over the years, but they have also grown in complexity. Over the years, new services have been implemented to satisfy the growing demand for easy to use ...
If you’ve followed us this year, you’ve read various posts from Yubico experts sharing their insights and expertise on the ...
Karen Scarfone is the principal consultant for Scarfone Cybersecurity. She provides cybersecurity publication consulting services to organizations and was formerly a senior computer scientist for the ...
In the NAC products we tested, authentication varies from very strong to very weak, and every point in-between. When starting down your path of evaluating NAC products, decide very early what kind of ...
Joel Snyder, Ph.D., is a senior IT consultant with 30 years of practice. An internationally recognized expert in the areas of security, messaging and networks, Dr. Snyder is a popular speaker and ...
Cyberattacks are on the rise everywhere today, with organizations and individual account passwords routinely targeted by hackers – especially where accounts are vulnerable due to a lack of additional ...