The Untapped Potential of Two-Factor Authentication

Two-factor authentication methods are more secure than passwords alone but require widespread adoption to be universally effective.

The post The Untapped Potential of Two-Factor Authentication appeared first on Security Intelligence.

Continue reading The Untapped Potential of Two-Factor Authentication

IBM Scores a Strong Performer Placement in Risk-Based Authentication Wave

IBM was recognized as a Strong Performer in “The Forrester Wave: Risk Based Authentication, Q3 2017,” earning the highest possible score in two categories.

The post IBM Scores a Strong Performer Placement in Risk-Based Authentication Wave appeared first on Security Intelligence.

Continue reading IBM Scores a Strong Performer Placement in Risk-Based Authentication Wave

IBM Scores a Strong Performer Placement in Risk-Based Authentication Wave

IBM was recognized as a Strong Performer in “The Forrester Wave: Risk Based Authentication, Q3 2017,” earning the highest possible score in two categories.

The post IBM Scores a Strong Performer Placement in Risk-Based Authentication Wave appeared first on Security Intelligence.

Continue reading IBM Scores a Strong Performer Placement in Risk-Based Authentication Wave

Cloud Security Is Not an Either/Or

Cloud security is neither a magic bullet for analysts, nor a particularly vulnerable target for cybercriminals. It all depends on the effort you put in.

The post Cloud Security Is Not an Either/Or appeared first on Security Intelligence.

Continue reading Cloud Security Is Not an Either/Or

The New NIST Digital Identity Guidelines and What They Mean to You

With the most recent draft of its Digital Identity Guidelines, NIST revised many of its federal recommendations regarding passwords and access management.

The post The New NIST Digital Identity Guidelines and What They Mean to You appeared first on Security Intelligence.

Continue reading The New NIST Digital Identity Guidelines and What They Mean to You

One Small Sticky Note on a Password Wall, One Giant Leap for Security

If you’re writing down your passwords on adhesive notes or in a journal, you might need a refresher on password security best practices.

The post One Small Sticky Note on a Password Wall, One Giant Leap for Security appeared first on Security Intelligence.

Continue reading One Small Sticky Note on a Password Wall, One Giant Leap for Security

One Small Sticky Note on a Password Wall, One Giant Leap for Security

If you’re writing down your passwords on adhesive notes or in a journal, you might need a refresher on password security best practices.

The post One Small Sticky Note on a Password Wall, One Giant Leap for Security appeared first on Security Intelligence.

Continue reading One Small Sticky Note on a Password Wall, One Giant Leap for Security

Protect Your Twitter Account or Face Serious Security Consequences

It’s crucial to protect your Twitter account to avoid exposing yourself or your business to financial, reputational and legal consequences.

The post Protect Your Twitter Account or Face Serious Security Consequences appeared first on Security Intelligence.

Continue reading Protect Your Twitter Account or Face Serious Security Consequences

Trust, but Verify: Authentication Without Validation Is Naïve

Fraudsters have rendered traditional authentication factors — something you know, something you have and something you are — ineffective.

The post Trust, but Verify: Authentication Without Validation Is Naïve appeared first on Security Intelligence.

Continue reading Trust, but Verify: Authentication Without Validation Is Naïve

Shakespeare, the Wizard of Oz and Multifactor Authentication

Multifactor authentication, a critical component of identity and access management, has been described in literature since Shakespeare’s time.

The post Shakespeare, the Wizard of Oz and Multifactor Authentication appeared first on Security Intelligence.

Continue reading Shakespeare, the Wizard of Oz and Multifactor Authentication