A number of factors inspired me to take a closer look at the Yubikey. For starters, it is such a simple and elegant solution to two of the major problems the security industry is facing these days: ...
Password authentication contains a lot of assumptions about security and trust. Encrypted SSH tunnels and public key verification are two common ways to ensure that your password is not compromised in ...
Of all the things which are annoying about the modern World Wide Web, the need to create and remember countless passwords is on the top of most people’s lists. From dozens of passwords for everything ...
If you are serious about computer/network security, then you must have a solid understanding of authentication methods. Debra Littlejohn Shinder takes a moment to lay out the role authentication plays ...
Correct identification of an individual using a computer or service is important because it represents the accountability of the person identified. If you know my username on a computer system, you ...
Authentication is the process that attempts to establish the identity of a user and is followed by an authorisation process that grants whatever privileges may be appropriate to that identity. Common ...
As a result, consumers may be more accepting of password alternatives, especially on accounts containing sensitive data. A bonus benefit to your customers and your conversion and login rates is that ...