13 Aug, 2015GSA approved Identiv readers, HID unveils PIN Tokens
Identiv PACs reader GSA approved; HID unveils PIN token; SALTO and Zaplox partner for hotel BLE deployments; WorldSpace adds PIV authentication; DOD orders more smart card readers.
You are here:
13 Aug, 2015GSA approved Identiv readers, HID unveils PIN Tokens
Identiv PACs reader GSA approved; HID unveils PIN token; SALTO and Zaplox partner for hotel BLE deployments; WorldSpace adds PIV authentication; DOD orders more smart card readers.
05 Aug, 2015Survey: Passwords aren’t going anywhere
The headlines often roar about the death of the password but the reality is the password isn’t going away anytime soon. What’s likely to happen is that other authentication factors – some more visible than others – will be used in conjunction with password for access to web sites and IT resources, according to a survey from SecureAuth.
04 Aug, 2015‘Cyber Sprint’ dramatically increases PIV usage
Agencies made significant steps toward increasing PIV usage during the “Cyber Sprint” with federal agencies increasing their use of strong authentication for privileged and unprivileged users from 42% to 72%.
30 Jul, 2015Gemalto releases HSM for the cloud, Carillon announces SCVP service
Gemalto announced the SafeNet Luna SA 6, a hardware security module built for service providers to offer crypto processing, key management and key storage in the cloud; Carillon Information Security Inc. announced that it now provides validation services for companies and government agencies looking for X.509 certificate path discovery and validation solutions; MorphoTrak announced that Teresa Wu has joined the company as director of Strategic Marketing and Government Relations; LEGIC announced that Cardag Deutschland GmbH would be a partner to its ID Network.
27 Jul, 2015Cybersecurity: Taller walls, deeper moats but the front gate is unguarded
The focus of cybersecurity has been on building better defenses but the front door has been left open as 4% of cybersecurity spending goes to identity. As more information is readily available on the dark web more needs to be done to secure identities online.
16 Jul, 2015Consumers want alternative to passwords
The ubiquitous passwords, everybody has them and everybody hates them kind of like bills. But while bills are unlikely to go away for most people alternatives to passwords exist and may start seeing more use. A report from Accenture, “Digital Trust in the IoT,” surveyed consumers about their attitudes towards user names and passwords.
14 Jul, 2015Survey: Identity at the center of securing IT networks
More than half of U.S. businesses have suffered some sort of breach and these hacks can cost millions of dollars in damages, according to survey results from Centrify Corp. At the center of protecting IT resources is identity, according to findings from Centrify’s “State of the Corporate Perimeter” survey of more than 400 US and UK IT decision makers.
25 Jun, 2015FST Biometrics wins contract, Telaeris adds biometrics, Crossmatch enhances Altus
The Israel Diamond Exchange has deployed FST Biometrics secure access solution at the entry point of its new polishing house; Telaeris adds biometric identification to its handheld line of products; Crossmatch announced enhanced functionality of its DigitalPersona Altus strong, multi-factor authentication solution.
10 Jun, 2015Password Managers Address the Cybersecurity Problem
Password management systems — software application or service that helps users keep track of all of their logins, usually by securing them under a single master password — are becoming popular options for individuals and enterprises to manage access to their online accounts.
03 Jun, 2015Episode 141: Hacking the hackers
The dark world of the web is exposed in a case study by CSID called Hacking the Hackers. The ID theft protection firm conducted an experiment this spring that shows why it’s bad practice to reuse passwords. CSID created a fake company, complete with employees who had social media accounts and credit cards, and exposed some of the company’s sensitive information online.
Enter the site