If you are serious about computer/network security, then you must have a solid understanding of authentication methods. Debra Littlejohn Shinder takes a moment to lay out the role authentication plays ...
As passwords routinely fail to protect users, multi-factor authentication (MFA) is fast emerging as the new gold standard of cybersecurity. By adding extra layers of protection, MFA is able to block ...
Corporate networks have not only grown in size over the years, but they have also grown in complexity. Over the years, new services have been implemented to satisfy the growing demand for easy to use ...
Password authentication contains a lot of assumptions about security and trust. Encrypted SSH tunnels and public key verification are two common ways to ensure that your password is not compromised in ...
eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. The security of USB-based connections and devices is ...
A number of factors inspired me to take a closer look at the Yubikey. For starters, it is such a simple and elegant solution to two of the major problems the security industry is facing these days: ...
BEAVERTON, Ore.--(BUSINESS WIRE)--USB Implementers Forum (USB-IF), the support organization for the advancement and adoption of USB technology, today announced the launch of its USB Type-C™ ...
SHENZHEN, China & BEAVERTON, Ore.--(BUSINESS WIRE)--The USB 3.0 Promoter Group today announced the USB Type-C™ Authentication specification, defining cryptographic-based authentication for USB Type-C™ ...
New personal identification and authentication technologies have the potential to transform the way entertainment services are delivered, accessed and experienced. These technologies offer a high ...