Authenticating users who log onto your network by account name and password only is the simplest and cheapest (and thus still the most popular) means of authentication. However, companies are ...
Strong authentication remains a cybersecurity priority under the Office of Management and Budget’s (OMB) cross-agency priority goals that were announced in the 2015 federal budget. In its 2015 budget ...
Within five years, we should see smartphones becoming an integral part of the ecosystem for the creation, management and use of secure identities. In some instances, phones will replace cards, but in ...
Software giant tightens up in-house security after hacker break-in. With notable exceptions such as the U.S. Defense Department, smart cards that contain encryption-based digital certificates for ...
Companies are offering new smart cards with improved technology, including security and counterfeiting resistance, in hopes of hastening their broader use. Stephen Shankland worked at CNET from 1998 ...
DataLocker Sentry 5 Encrypted USB Achieves FIPS 140-3 Level 3 Validation and Introduces Smart Card Authentication for Federal-Grade Portable Security DataLocker, Inc., a leader in hardware-encrypted ...
Employees at Post & Schell PC, a law firm in Philadelphia, need smart cards to do just about everything, from entering company facilities and using elevators to securing two-factor authentication so ...
A recent Datamonitor survey showed that 62% of enterprises have experienced problems relating to passwords being shared, borrowed or stolen from within their organizations. The survey of 200 ...
A variant of the Sykipot Trojan Horse hijacks U.S. Department of Defense (DoD) smart cards in order to access restricted resources. “We recently discovered a variant of Sykipot with some new, ...
On Monday, the Redmond, Wash., software giant announced a deal to acquire Ottawa-based Alacris, an ISV partner and maker of ID and smart-card management software, for an undisclosed amount and to ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results