News

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now In today’s sprawling IT landscape ...
Our content is funded in part by commercial partnerships, at no extra cost to you and without impact to our editorial impartiality. Click to Learn More As passwords routinely fail to protect users, ...
Voice authentication seemed convenient—until AI made it a security disaster. What was already a flawed security method has become dangerously unreliable, and most people don't realize how vulnerable ...
In today’s digital age, personal data is never safe. Cybercriminals are looking for every opportunity possible to acquire your user data. Ongoing data breaches continue to expose usernames, passwords, ...
As promised last issue, I’m re-printing a glossary of strong/second factor authentication methods that TriCipher provided me along with the results of its sponsored survey on people’s perceptions of ...
Microsoft this week announced a preview of "Authentication Strength," a new control for organizations using the Azure Active Directory Conditional Access service. Authentication Strength lets IT pros ...
Expertise from Forbes Councils members, operated under license. Opinions expressed are those of the author. You’re probably seeking ways to reduce the friction your customers face when they log on to ...
When I mentioned to a few friends that I was writing a feature about two-step authentication, the typical response was an eye-roll and "Oh, that annoying thing?..." Yes, that annoying extra step.
It is fair to say that 3D printing is revolutionizing the manufacturing landscape. Can you imagine sending a 3D print of your feet to have a pair of shoes customized for you? This is not really that ...