Tag "Authentication"

Back to homepage
Software

Increased appetite for biometrics fueled by speed, security and convenience

The Biometric Consumer Sentiment Survey of more than 1,000 U.S. adults who have experience using biometrics to log into their accounts, reveals an increased appetite for the technology. 70 percent

Software

What is biometrics? And why collecting biometric data is risky

Biometrics has the potential to make authentication dramatically faster, easier and more secure than traditional passwords, but companies need to be careful about the biometric data they collect. Biometric authentication

Industry Insights

Advanced Customer Verification – Are You Ready For That?

Fraud is on the rise and attacks made by cybercriminals are becoming more sophisticated. Basic identity proofing is no longer effective, so it’s time for turning the clunky process into

Software

Zero trust browsing: Protect your organization from its own users

To the casual observer, the cyberattack landscape is constantly shifting. In recent years, the threats and scams have evolved from Nigerian princes to stranded travelers, pop-ups warning of outdated software

Software

Best Practices for Choosing Good Security Questions

Security questions can add an extra layer of certainty to your authentication process. Security questions are an alternative way of identifying your customers when they have forgotten their password, entered

Software

Email authentication use growing steadily in every industry sector

U.S. federal government agencies and many major enterprises have made significant strides to thwart the spread of fake emails, a major cybersecurity attack vector. But many organizations remain susceptible because they’re

Software

How privacy and security concerns affect password practices

Yubico announced the results of the company’s 2019 State of Password and Authentication Security Behaviors Report, conducted by the Ponemon Institute, who surveyed 1,761 IT and IT security practitioners in

Software

Two-Factor Authentication Might Not Keep You Safe

The online security “best practice” is still vulnerable to phishing attacks. Here’s how two-factor authentication is supposed to work: You log in to your bank account or email inbox, and

Industry Insights

The most effective security strategies to guard sensitive information

Today’s enterprise IT infrastructures are not largely hosted in the public cloud, nor are they SaaS-based, with security being the single largest barrier when it comes to cloud and SaaS adoption.

Software

Accessibility Trumps Security in the Battle Between Authentication Alternatives

A new Ping Identity survey has revealed that simplicity wins out over security when it comes to authentication. Respondents to our recent survey knew what provided better security, but continued