How Authentication and Identification Work Together to Build Digital Trust

Building trust in an online or mobile user requires both identification and authentication.

The post How Authentication and Identification Work Together to Build Digital Trust appeared first on Security Intelligence.

Continue reading How Authentication and Identification Work Together to Build Digital Trust

Long Live the Password — Even if You Don’t Want It To

To reduce the risk of a breach due to weak or stolen passwords, companies are adopting multifactor authentication, which requires users to submit an extra piece of data in addition to their password.

The post Long Live the Password — Even if You Don’t Want It To appeared first on Security Intelligence.

Continue reading Long Live the Password — Even if You Don’t Want It To

Popular family tracking app exposed real-time location data onto the internet – no password required

More than 238,000 individuals users have had their family’s real-time location exposed for weeks on end after an app developer left sensitive data exposed on the internet, without a password. Many users of “Family Locator”, an iOS app… Continue reading Popular family tracking app exposed real-time location data onto the internet – no password required

Are Passwords Killing Your Customer Experience? Try Passwordless Authentication

By implementing passwordless authentication, organizations can deliver the experience customers deserve and the security they demand.

The post Are Passwords Killing Your Customer Experience? Try Passwordless Authentication appeared first on Security Intelligence.

Continue reading Are Passwords Killing Your Customer Experience? Try Passwordless Authentication

The Inconvenient Truth About Your Eight-Character Password

Your eight-character password is not as secure as you might think, but there are several simple actions you can take to truly strengthen your password security.

The post The Inconvenient Truth About Your Eight-Character Password appeared first on Security Intelligence.

Continue reading The Inconvenient Truth About Your Eight-Character Password

How to Keep Your Passwords Private

Ever wondered what types of online threats you can run into simply by browsing the web? How a seemingly legitimate website could affect your privacy or your data? Bitdefender 2019 Network Threat Prevention technology protects you against all that. Pass… Continue reading How to Keep Your Passwords Private

Why Multifactor Authentication Is Crucial to Strengthen Mainframe Security

By adopting a multifactor authentication (MFA) solution for mainframe security, organizations can protect their most sensitive assets from cybercriminals looking to exploit stolen credentials.

The post Why Multifactor Authentication Is Crucial to Strengthen Mainframe Security appeared first on Security Intelligence.

Continue reading Why Multifactor Authentication Is Crucial to Strengthen Mainframe Security

It’s Time to Take Advantage of Multifactor Authentication for Mainframe Security

The increasing sophistication of the threat landscape is influencing organizations to adopt multifactor authentication to protect data on all kinds of systems, from mobile phones to mainframes.

The post It’s Time to Take Advantage of Multifactor Authentication for Mainframe Security appeared first on Security Intelligence.

Continue reading It’s Time to Take Advantage of Multifactor Authentication for Mainframe Security

A Proposed Solution to the Password Reuse Problem

A group of researchers proposed a new framework that would enable web services to share users’ password hash data in an effort to reduce password reuse.

The post A Proposed Solution to the Password Reuse Problem appeared first on Security Intelligence.

Continue reading A Proposed Solution to the Password Reuse Problem