Two-factor authentication methods are more secure than passwords alone but require widespread adoption to be universally effective.
As banking and retail institutions adopt stronger security measures, cybercrime trends are shifting to maximize fraudsters' ROI.
IBM was recognized as a Strong Performer in "The Forrester Wave: Risk Based Authentication, Q3 2017," earning the highest possible score in two categories.
Digital certificates are used to authenticate both sides of a browser connection. It's a good first step, but certificates do not assure absolute trust.
Many high-profile online services are vulnerable to a new type of attack that could enable fraudsters to intercept password reset requests.
The OTA "Online Trust Audit and Honor Roll" graded more than 1,000 consumer-facing firms on website security and found that many are simply failing.
With the most recent draft of its Digital Identity Guidelines, NIST revised many of its federal recommendations regarding passwords and access management.
To effectively manage your IoT population, you must understand where your devices are, what they do, who is using them and how they connect to the network.
The open source FreeRADIUS project recently patched a vulnerability that allowed malicious actors to bypass session authentication.
Tourists should follow these travel security best practices to protect their devices and data from cybercriminals, especially in foreign countries.