Shakespeare, the Wizard of Oz and Multifactor Authentication

Multifactor authentication, a critical component of identity and access management, has been described in literature since Shakespeare’s time.

The post Shakespeare, the Wizard of Oz and Multifactor Authentication appeared first on Security Intelligence.

Continue reading Shakespeare, the Wizard of Oz and Multifactor Authentication

The Best Defense Is a Good Offense: The Value of User Education

User education and online safety training can be invaluable weapons against cyberthreats, especially for IT teams that are short on resources.

The post The Best Defense Is a Good Offense: The Value of User Education appeared first on Security Intelligence.

Continue reading The Best Defense Is a Good Offense: The Value of User Education

IAM Feeling Good? What CISOs Should Know About the Feeling of Identity and Access Management Solutions

Identity and access management (IAM) is critical, but an inconvenient authentication process makes for a lousy user experience.

The post IAM Feeling Good? What CISOs Should Know About the Feeling of Identity and Access Management Solutions appeared first on Security Intelligence.

Continue reading IAM Feeling Good? What CISOs Should Know About the Feeling of Identity and Access Management Solutions

IAM Feeling Good? What CISOs Should Know About the Feeling of Identity and Access Management Solutions

Identity and access management (IAM) is critical, but an inconvenient authentication process makes for a lousy user experience.

The post IAM Feeling Good? What CISOs Should Know About the Feeling of Identity and Access Management Solutions appeared first on Security Intelligence.

Continue reading IAM Feeling Good? What CISOs Should Know About the Feeling of Identity and Access Management Solutions

It’s Time for Users to Pony Up and Quit Reusing Passwords

By reusing passwords across multiple services, users make it easier for cybercriminals to breach all their accounts, not to mention company databases.

The post It’s Time for Users to Pony Up and Quit Reusing Passwords appeared first on Security Intelligence.

Continue reading It’s Time for Users to Pony Up and Quit Reusing Passwords

Two-Factor Authentication: A Little Goes a Long Way

Online services are understandably reluctant to add steps to the login process, but a little two-factor authentication can significantly boost security.

The post Two-Factor Authentication: A Little Goes a Long Way appeared first on Security Intelligence.

Continue reading Two-Factor Authentication: A Little Goes a Long Way

Hacked by a Kid?! A Story to Illustrate the State of Authentication Today

A 6-year-old child ordered $250 worth of merchandise by using her sleeping mother’s fingerprint to satisfy the authentication requirements on her phone.

The post Hacked by a Kid?! A Story to Illustrate the State of Authentication Today appeared first on Security Intelligence.

Continue reading Hacked by a Kid?! A Story to Illustrate the State of Authentication Today

Too Many Passwords: Is the End in Sight?

Will passwords become things of the past in 2017? Today, organizations tasked with managing too many passwords are at risk of phishing and malware attacks.

The post Too Many Passwords: Is the End in Sight? appeared first on Security Intelligence.

Continue reading Too Many Passwords: Is the End in Sight?

Cybercriminals Are Getting Better at Using Advanced Authentication Methods

Cybercriminals are becoming more advanced and learning how to leverage the latest authentication methods to exploit security weaknesses.

The post Cybercriminals Are Getting Better at Using Advanced Authentication Methods appeared first on Security Intelligence.

Continue reading Cybercriminals Are Getting Better at Using Advanced Authentication Methods

Security Starts With People: What it Takes to Ensure Simple Yet Strong Authentication on Mobile

IT professionals and mobile app developers must figure out a way to implement strong authentication capabilities without complicating the user experience.

The post Security Starts With People: What it Takes to Ensure Simple Yet Strong Authentication on Mobile appeared first on Security Intelligence.

Continue reading Security Starts With People: What it Takes to Ensure Simple Yet Strong Authentication on Mobile