Latest Headlines

Latest Headlines

Spotlight: Dell beefs up its endpoint security suite

Dell announced on Tuesday that it is beefing up its endpoint security suite to stop malware attacks, secure data and meet compliance requirements for corporate devices.

How Alohar hopes to 'fingerprint' the way you walk for new authentication tool

Alohar Mobile has received a patent for a system that would use the sensors in mobile phones to create a "fingerprint" of the way you walk, using the data for authentication purposes. 

Spotlight: The price bank customers pay for lack of authentication

This week, one of my favorite online analysts shares the experience of his new bank doubting his authenticity as a genuine person.

Top 10 issues in communications: Number 5, the uncertain future of identity

It remains the conversation we're afraid to have: the one that leads us to the conclusion that the only way to secure our communications is with a system that reliably identifies us.

Following celebrity photo leak, Apple expands iCloud backups protection

Apple has expanded the use of two-factor authentication to protect iCloud backups.

Printer security flaw enables a hacker to spy on documents

At a recent security conference in London, a researcher was able to hack into the web interface of a wireless Canon Pixma printer, used extensively by small and medium-sized enterprises and run the video game Doom on the printer's menu screen, Ars Technica reports.

Wells Fargo picks mobile banking-related startups as first participants in accelerator program

Wells Fargo has taken three mobile banking-related startups under its wing as part of its first official accelerator program.

Infographic: How all consumers end up paying for data breaches

Consumers end up paying for data breaches whether their personal information was compromised or not. That is the conclusion of an analysis prepared by two-factor authentication firm Authentify.

Virtualization: A solution for securing mobile identity?

If someone steals your phone then logs onto your apps, those apps may think they're working with you. What if the connection between you and those apps could be severed first?

Ping Identity architect: SAML 'might not be the future'

The identity assertion language that developers adopted for authentication just four years ago may already be outdated, says someone you'd think would be SAML's evangelist.