Identity Assurance

Why You Should Consider FIDO Universal 2-Factor Authentication

Most IT and cybersecurity professionals have at least occasional anxiety about when the next major virus, ransomware or swarm bot will hit. With the bulk of data breaches occurring at the network perimeter—as users get their emails and go online—user authentication software is a primary concern.

The Role of PKI and Credential Management in Modern Authentication

While we enjoy the business opportunities, productivity gains and user conveniences of our data-driven economy, we certainly do not enjoy the cost and devastation of having accounts hacked, clients’ data stolen or employees’ identities misused.

Citizen Authentication and Mobility

State governments, municipalities and other local agencies can sometimes struggle with authenticating their citizens, particularly in an increasingly mobile world. Effective identity and access management is vital to protecting sensitive data but must be balanced against the need for citizens to have access to their own information.

October is National Cybersecurity Month

As a collaborative effort between the government and the cybersecurity industry, National Cybersecurity Awareness Month (NCSAM) is held every October. The educational month helps raise awareness of how businesses and individuals can protect themselves online. With criminals, hackers, and other bad actors continually developing how they attack and gain access to systems and data, we must educate ourselves on the best ways to defend against it.

Access & Identity Management—Better in the Cloud?

Today’s fast-changing digital environment is throwing identity and authentication challenges at us from every direction. Remote workforces, mobile apps, the Internet of Things (IoT) and increasingly complex data theft schemes just keep upping cybersecurity risks in every type of organization.

Approaches to Identity and Access Management for Local Governments, Employees and Citizens

Identity and access management (IAM) is top-of-mind for IT departments across state governments, municipalities, and other local areas. Government employees need properly-authorized access to relevant information so that state and regional agencies can perform their roles. At the same time, the need to balance ease-of-access to data with the sensitivity of information about individuals, organizations, and other parties is critical.

Continuous Authentication: Security for an Evolving Threat Landscape

Employees enter login credentials and, once authenticated, gain secure access to valuable network resources and applications. However, requiring users to go through the authentication process only once is turning out to be a risk factor in itself. This process leaves organizations vulnerable to risk every time an employee steps away from their desk, clicks a link, shares a password, or misplaces a mobile phone. If a user authenticates only at login, credential misuse mid-session can go unnoticed.

Taking Mobile Authentication Mainstream

The online hub for the modern workforce is the mobile phone—making reliable, frictionless security critical. Without it, text messages, location data, contacts and any account information stored on the phone is at risk for theft and misuse. Moreover, the broader universe of enterprise applications accessed through the mobile device can be imperiled.

A Brief History of the Password & Why It Matters



“Success in creating AI would be the biggest event in human history. Unfortunately, it might also be the last, unless we learn how to avoid the risks.”

– Steven Hawking


Protecting Biometrics at Rest, an Essential Tutorial

Biometric authentication is fast and convenient. Touch your phone and it is unlocked. Look through an iris scanner and enter a secure room. Speak into your phone for hands-free authentication. Governments, law enforcement, airports, and corporations use it. However, is biometric authentication that simple? Not really when you consider the policy issues, privacy concerns, and complexity of biometric data protection.

Pages

Subscribe