In today’s digital age, personal data is never safe. Cybercriminals are looking for every opportunity possible to acquire your user data. Ongoing data breaches continue to expose usernames, passwords, ...
It seems like consumer data is compromised in some massive data breach every other week. You should expect the companies you do business with to do everything possible to prevent data breaches and ...
As promised last issue, I’m re-printing a glossary of strong/second factor authentication methods that TriCipher provided me along with the results of its sponsored survey on people’s perceptions of ...
The inherent challenges of confirming a person’s identity remotely are nothing new. From the days of letter writing, businesses have struggled to find sure-fire methods for ensuring that the person ...
Mike Chapple is associate teaching professor of IT, analytics and operations at the University of Notre Dame. Just about every information security standard or regulation contains requirements for the ...
A deep dive into implicit identity authentication methods for software development, covering oauth 2.0 flows, security risks, and modern alternatives for single-page applications.
The University of Iowa’s Information and Technology Services, or IT Services, has implemented an update to Duo Push, which will strengthen two-factor authentication amid a rise in cybersecurity ...
A deep dive comparing API Keys, OAuth 2.0, JWT, and HMAC for CTOs. Learn which api authentication method fits your enterprise SSO and IAM strategy.
In 2017, we saw a new influx of spectacular and devastating breaches. Somewhat lost in the chaos was a surprising trend amongst them -- a sharp escalation in attackers utilizing stolen, valid ...
COSTA MESA, Calif.--(BUSINESS WIRE)--As more consumers engage with businesses digitally to bank, shop or pay, online security remains the top concern. Survey insights from Experian’s annual Global ...