Cybercriminals Are Getting Better at Using Advanced Authentication Methods

Cybercriminals are becoming more advanced and learning how to leverage the latest authentication methods to exploit security weaknesses.

The post Cybercriminals Are Getting Better at Using Advanced Authentication Methods appeared first on Security Intelligence.

Continue reading Cybercriminals Are Getting Better at Using Advanced Authentication Methods

Security Starts With People: What it Takes to Ensure Simple Yet Strong Authentication on Mobile

IT professionals and mobile app developers must figure out a way to implement strong authentication capabilities without complicating the user experience.

The post Security Starts With People: What it Takes to Ensure Simple Yet Strong Authentication on Mobile appeared first on Security Intelligence.

Continue reading Security Starts With People: What it Takes to Ensure Simple Yet Strong Authentication on Mobile

What’s Wrong With SMS Authentication? Two IBM Experts Weigh In on the NIST Recommendation

IBM experts Dustin Hoff and Ashish Malhotra discussed ways for businesses and end users to mitigate security issues stemming from SMS authentication.

The post What’s Wrong With SMS Authentication? Two IBM Experts Weigh In on the NIST Recommendation appeared first on Security Intelligence.

Continue reading What’s Wrong With SMS Authentication? Two IBM Experts Weigh In on the NIST Recommendation