Authentication

Authentication | News, how-tos, features, reviews, and videos

security display showing  biometric processing
5 password best practices unique passwords authentication

login password - user permissions - administrative control

Using a password manager: 7 pros and cons

This veteran security pro feels more secure now that he's using a password manager, but there are still risks.

Facebook / privacy / security / breach / wide-eyed fear

Hey Facebook: Quit discouraging people from using 2FA

Facebook is spying on user 2FA phone numbers to target them with ads. A non-trivial percentage of Facebook users will not use two-factor authentication as a result, a net loss to security.

passwords

What is single sign-on? How SSO improves security and the user experience

Password fatigue, cloud sprawl and developer simplicity are pushing the rise of SSO.

woman phone scam

4 scams that illustrate the one-way authentication problem

These scams rely on tricking consumers into believing they are interacting with a trusted vendor. Here’s how vendors can prevent the scams.

user authentication

How to evaluate web authentication methods

Authentication evaluation white paper includes popular and obscure methods and outlines a framework for assessing their security effectiveness.

continuous authentication

What is access control? A key component of data security

Access control is a method of guaranteeing that users are who they say they are and that they have the appropriate access to company data. It is a vital aspect of data security, but it has some significant enforcement challenges.

keys authentication

What is two-factor authentication (2FA)? How to enable it and why you should

With Google, Facebook, Instagram, or your own internal accounts, 2FA provides an extra layer of protection that helps keep hackers out.

authentication

What is SAML? How it works and how it enables single sign on

The Security Assertion Markup Language (SAML) standard defines how providers can offer both authentication and authorization services. Here's what you need to know.

2 token authentication locks

What is the biggest threat from the Equifax breach? Account takeovers

Cyber criminals have the most to gain by taking ownership of bank, brokerage and retirement accounts using people’s PII. Are traditional authentication systems obsolete?

keys to access solutions admission movie ticket

What is OAuth? How the open authorization framework works

OAuth allows websites and services to share assets among users. It is widely accepted, but be aware of its vulnerabilities.

Load More