Cloud and BYOD are fueling demand for strong authentication and one-time password products. This demand is expected to boost the market for these products by nearly seven percent per year to $2.2 billion in 2018, according to market research firm Frost & Sullivan.
A self-replicating worm named 'The Moon' has infected a range of Linksys router models, according to the Internet Storm Center at the SANS Institute.
Security and functionality gaps exist in beacon deployments at retailers and other early adopters, warns Mobiquity Labs.
A new Trojan has been discovered that targets users of World of Warcraft, a popular online role-playing game. What is troubling is how the malware is able to defeat the company's two-factor authentication system, which is implemented using either a physical token or a mobile application to generate the requisite one-time code.
Despite being much maligned, passwords can be a useful security tool if bolstered by two-factor authentication, according to a survey of 428 security practitioners conducted by security firm Authentify.
Smartphone security is a growing concern of both consumers and enterprises. Many owners either do not secure their phones using passwords or use easy-to-crack passwords, exposing the data on their phones to hackers and theives.
BYOD and cloud-based applications are fueling the need for mobile encryption software and services, a market that is forecast by ABI Research to reach $230 million by the end of this year.
The USPS has awarded a three-year, $15 million contract to SecureKey to develop a cloud-based authentication service.If anyone knows you, it the U.S. Postal Service. So wouldn't it make sense for the USPS to be the agency in charge of the new Federal Cloud Credential Exchange (FCCX)? The Postal Service thinks so.
Barclays Wealth, the private banking unit of the London-based financial services firm, is using voice recognition to authenticate customers who dial its call centers.
When auditors show up at your door, there's a good likelihood they'll want to take a close look at your access control regime because this system is integral to the separation of duties and user monitoring mandates in so many regulations. There are four key issues surrounding access control that auditors often look for, reports Ericka Chickowski at Dark Reading.