Tag "Authentication"

Back to homepage
Software

3 Reasons Why B2C Enterprises Should Use Single Sign-on Authentication

Single sign-on authentication, or SSO, is becoming more commonplace as the digital revolution continues to evolve. With numerous benefits for customers and companies alike, SSO helps streamline user experience, aid movement between

Software

Beating biometrics: Why biometric authentication alone is not a panacea

As we witness the accelerating use of biometrics throughout our lives, we must pause to consider the risks and ramifications of doing so as technological advancements make it increasingly easy to mimic,

Network Security

How 5G Introduces New Security Vulnerabilities

The migration to 5G is underway with more hype than any IT innovation in history (at least it feels that way). Predictions about 5G’s potential have reached fever pitch, according

Software

On the path to Zero Trust security: Time to get started

No need to belabour the point. We all know that trying to defend the network perimeter is a bit futile in today’s mobile and cloud first world. So, the obvious question –

Artificial Intelligence Software

On the path to Zero Trust security: Time to get started

No need to belabour the point. We all know that trying to defend the network perimeter is a bit futile in today’s mobile and cloud first world. So, the obvious question –

Software

PSD2 and strong customer authentication: Are all elements equal?

The European Payment Services Directive 2 (PSD2), introduced in January 2018, contains the requirement for additional security features for certain online transactions. These security requirements, known as Strong Customer Authentication

Software

Cybercriminals thriving on companies overlooking fundamental security requirements

IT leaders in the United States are putting business data at risk by not effectively managing employees’ passwords, according to OneLogin research. Despite the fact that 91% report they have

Software

The role of size when it comes to the security and usability of the biometric fingerprint sensor

A lack of knowledge about fingerprint sensor size is threatening to undermine the biometric revolution.There is no denying the fingerprint biometric payment smart card is reaching its inflection point. In

Software

Too fast, too insecure: Securing Mongo Express web administrative interfaces

Mongo Express is a lightweight web-based administrative interface deployed to manage MongoDB databases interactively. It is authored using Node.js, Express and Bootstrap packages. This case study highlights the deployment of Mongo

Software

Cyberwar against NATO: Who are Earworm and APT28?

There is a group of cybercriminals who are really making things difficult for NATO. The group is called Earworm and, over the last few years, it has been doing what