The Case for IAM: Three Reasons to Develop Your IAM and Authentication Practices

Most professionals grasp the importance of user authentication, but few recognize the benefit of using IAM and authentication as a standalone authority.

The post The Case for IAM: Three Reasons to Develop Your IAM and Authentication Practices appeared first on Security Intelligence.

Continue reading The Case for IAM: Three Reasons to Develop Your IAM and Authentication Practices

Biometric Authentication: Finding a Balance Between UX and IT Security

When it comes to authentication, most security professionals see it as a necessary evil. It provides security at the expense of the end user’s desire for a frictionless experience. That way of thinking, however, was challenged at the Opus Research Intelligent Authentication 2016 conference. The two-day event made a point to highlight authentication not only […]

The post Biometric Authentication: Finding a Balance Between UX and IT Security appeared first on Security Intelligence.

Continue reading Biometric Authentication: Finding a Balance Between UX and IT Security

What’s Wrong With SMS Authentication? Two IBM Experts Weigh In on the NIST Recommendation

IBM experts Dustin Hoff and Ashish Malhotra discussed ways for businesses and end users to mitigate security issues stemming from SMS authentication.

The post What’s Wrong With SMS Authentication? Two IBM Experts Weigh In on the NIST Recommendation appeared first on Security Intelligence.

Continue reading What’s Wrong With SMS Authentication? Two IBM Experts Weigh In on the NIST Recommendation

The Rise of the Selfie Authentication as a New Security Factor

Many online vendors are moving toward more innovative and secure methods of confirming a user’s identity, including selfie authentication.

The post The Rise of the Selfie Authentication as a New Security Factor appeared first on Security Intelligence.

Continue reading The Rise of the Selfie Authentication as a New Security Factor

The Insider Threat: Are You at Risk?

Some security red flags, such as the presence of shadow IT and weak authentication practices, could indicate a high risk for an insider threat.

The post The Insider Threat: Are You at Risk? appeared first on Security Intelligence.

Continue reading The Insider Threat: Are You at Risk?

The Evolution of Voice Authentication as a Security Method

Voice authentication has the potential to alter the security industry, but the access method comes with some drawbacks that should be considered.

The post The Evolution of Voice Authentication as a Security Method appeared first on Security Intelligence.

Continue reading The Evolution of Voice Authentication as a Security Method