Hacked by a Kid?! A Story to Illustrate the State of Authentication Today

A 6-year-old child ordered $250 worth of merchandise by using her sleeping mother’s fingerprint to satisfy the authentication requirements on her phone.

The post Hacked by a Kid?! A Story to Illustrate the State of Authentication Today appeared first on Security Intelligence.

Continue reading Hacked by a Kid?! A Story to Illustrate the State of Authentication Today

A Security Professional’s Cheat Sheet for the Holidays: Hacks, Breaches and More!

This list of notable 2016 data breaches can serve as a cheat sheet for a security professional who is pressed for the latest tech news during the holidays.

The post A Security Professional’s Cheat Sheet for the Holidays: Hacks, Breaches and More! appeared first on Security Intelligence.

Continue reading A Security Professional’s Cheat Sheet for the Holidays: Hacks, Breaches and More!

Security Starts With People: What it Takes to Ensure Simple Yet Strong Authentication on Mobile

IT professionals and mobile app developers must figure out a way to implement strong authentication capabilities without complicating the user experience.

The post Security Starts With People: What it Takes to Ensure Simple Yet Strong Authentication on Mobile appeared first on Security Intelligence.

Continue reading Security Starts With People: What it Takes to Ensure Simple Yet Strong Authentication on Mobile

The Case for IAM: Three Reasons to Develop Your IAM and Authentication Practices

Most professionals grasp the importance of user authentication, but few recognize the benefit of using IAM and authentication as a standalone authority.

The post The Case for IAM: Three Reasons to Develop Your IAM and Authentication Practices appeared first on Security Intelligence.

Continue reading The Case for IAM: Three Reasons to Develop Your IAM and Authentication Practices

Biometric Authentication: Finding a Balance Between UX and IT Security

When it comes to authentication, most security professionals see it as a necessary evil. It provides security at the expense of the end user’s desire for a frictionless experience. That way of thinking, however, was challenged at the Opus Research Intelligent Authentication 2016 conference. The two-day event made a point to highlight authentication not only […]

The post Biometric Authentication: Finding a Balance Between UX and IT Security appeared first on Security Intelligence.

Continue reading Biometric Authentication: Finding a Balance Between UX and IT Security

KuppingerCole Report Reveals Tremendous Growth in Interest of Web Access Management and Identity Federation

A recent KuppingerCole report for web access management and identity federation called out IBM Security Access Manager as a leader in the space.

The post KuppingerCole Report Reveals Tremendous Growth in Interest of Web Access Management and Identity Federation appeared first on Security Intelligence.

Continue reading KuppingerCole Report Reveals Tremendous Growth in Interest of Web Access Management and Identity Federation

Not All Heroes Wear Capes: How IAM Can Save You From Your Next Data Breach

Identity and access management solutions that incorporate risk-based controls can help organizations avoid a potentially harmful data breach.

The post Not All Heroes Wear Capes: How IAM Can Save You From Your Next Data Breach appeared first on Security Intelligence.

Continue reading Not All Heroes Wear Capes: How IAM Can Save You From Your Next Data Breach

The Always-On Culture + Mobile Access = IT Nightmare?

Managing mobile access is an IT nightmare in today’s always-on corporate environment, and security teams need all the help they can get.

The post The Always-On Culture + Mobile Access = IT Nightmare? appeared first on Security Intelligence.

Continue reading The Always-On Culture + Mobile Access = IT Nightmare?