Asia's Source for Enterprise Network Knowledge

Sunday, May 26th, 2019

Authentication

Making authentication and security as simple as possible

Making authentication and security as simple as possible

Two-factor authentication solutions may have been readily available to market for a while but the fact is that it remains underutilized despite the threats related to cybersecurity becoming more prevalent globally.

The challenges and benefits of Identity and Access Management

The Challenges and Benefits of Identity and Access Management

Identity and access management (IAM) solutions must balance streamlined authentication with increasingly complex security concerns.

By downloading this document, your details might be provided to the sponsor. If you cannot download the document, please contact us.

What is OAuth? What security pros need to know

Keys to access

The OAuth open authorization framework allows websites and services to share assets among users. It is widely accepted, but be aware of its vulnerabilities.

How Intel Core chips could take over two-factor authentication from your phone

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

Just make sure that your first line of defense—a Windows password or PIN—is secure, too.

 

How safe are your passwords? Real life rules for businesses to live by

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

While people applaud easier password guidance from NIST, easier is not better. Here’s what you need to consider when creating a company password policy.

 

What is OAuth? What security pros need to know

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

The OAuth open authorization framework allows websites and services to share assets among users. It is widely accepted, but be aware of its vulnerabilities.

 

Companion mobile app exposed Hyundai cars to potential hijacking

The app failed to secure sensitive data could have allowed hackers to remotely locate, unlock, and start vehicles

Companion mobile app exposed Hyundai cars to potential hijacking

Companion mobile app exposed Hyundai cars to potential hijacking

The app failed to secure sensitive data could have allowed hackers to remotely locate, unlock, and start vehicles

Kaspersky Lab releases cloud-based fraud prevention solution

Kaspersky Lab releases cloud-based fraud prevention solution

Kaspersky Lab has released Kaspersky Fraud Prevention Cloud, a new solution for organizations facing risks from fraudulent activity via fast-growing online services.

Voice authentication helps Citi cut verification process by 66%

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

Clients who call into the bank’s contact centers have their identity automatically verified within 15 seconds or less as they explain their reason for calling.