Small businesses are prime targets for credential attacks. Learn why a password manager is essential for reducing risk, improving security, and saving time.
The award was presented during the mainstage session at Ping Identity’s Revenue Kickoff (PingRKO 2026) in Dallas. Being ...
Last week, you may have read the headline "WPA Cracked!" or something to that effect. Just to clear things up now, it is not the overall standard that has been "cracked" but the simpler implementation ...
MOUNTAIN VIEW, Calif.--(BUSINESS WIRE)--The FIDO Alliance has announced the agenda and speaker lineup for its next Virtual Authenticate Summit, “The Imperative for Strong Authentication for Government ...
Digital payments have been moving to the automobile dashboard for some time, and now the latest development is user authentication. Visa Inc. and the big automaker Daimler AG are planning to launch so ...
TriCipher has long been known for its strong layered approach to user authentication. Many businesses such as financial institutions have implemented a TriCipher solution to authenticate customers ...
DALLAS, June 30 /PRNewswire/ -- More organizations than ever before are now able to deploy the Entrust, Inc., versatile authentication platform, designed to protect access to Microsoft Windows ...
A couple of weeks ago, we outlined some of the concerns users have about the security of VPNs for corporate use, and some readers have written in saying that their concerns aren’t necessarily about ...
-- RSA, The Security Division of EMC (NYSE: EMC), announces the release of software developer kits (SDKs) designed for mobile application developers to seamlessly integrate strong one-time password ...
The announcement last week that U.S. Bancorp, the eighth-largest U.S. bank, signed a deal with VeriSign Inc. to secure customer access to online commercial banking services could signal a significant ...
Scammers have found a way around new token-based authentication systems that have been adopted by some banks. Over the past few weeks, approximately 35 phishing Web sites have been set up that use the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results