Thursday, April 11, 2013MasterCard brings digital wallet to Canada Payments processing company unveils authentication platform that can help retailers by holding credentials for 25 credit and debit cards
Tuesday, November 06, 2012Online banking ID will access government services GTEC 2012 Citizens will soon be able to use their banking credentials to log into government Web sites. Would you share your account info with Canada Revenue?
Monday, July 16, 2012SIDEBAR: What organizations can do Five things any business or government department should do to strengthen password authentication
Thursday, June 21, 2012Google Apps admins can now force two-step sign-in The process demands both a password and a code texted to the user's cell phone. It's been available for two years, but most users found it cumbersome
Friday, July 29, 2011Google's two-step authentication rolls out worldwide The service, intended to make it more difficult for hackers to break into Google accounts, is being rolled out in 40 languages in 150 countries
Wednesday, July 13, 2011Look to government identity management for ideas: Analyst There are good examples in how the U.S. government is innovating in the area of federated identity assurance, for both government-specific and commercial scenarios that require trusted online interactions
Tuesday, April 12, 2011Cloud computing is not just a name for outsourcing When you can buy a server for 12 cents an hour it changes everything about how you run your IT department
Tuesday, April 05, 2011RSA divulges details of hack on its SecurID system RSA has started providing more detail into the mid-March attack on its SecurID token-based authentication system. The catch: to get a fuller story, you must be an RSA customer willing to sign a nondisclosure agreement
Friday, March 04, 2011Identity management on mobile: one company’s story Extreme Networks’ roadmap will steer its product line toward mobile device and application access. What did this mean for user authentication?
Monday, February 28, 2011The squeeze is on FEATURE: How to keep your network safe from your staff's pesky consumer mobile devices
Thursday, February 17, 2011New protection in the cloud by CA Technologies Safely access company data on your smart phone using a single time password
Wednesday, February 16, 2011CA cloud authentication assesses security risk The identity management service now offers risk-based scoring that ties the strength of the authentication needed to the specific application the user wants to do after initial logon
Thursday, February 10, 2011Intel core processors to get authentication security The system, known as Intel Identity Protection Technology, features built in two-factor authentication to stop unauthorized access to the system
Thursday, January 27, 2011Smart cards no match for online spies Hackers are using a 'smart card proxy' attack to get around smart cards, according to security consultancy Mandiant
Thursday, January 27, 2011Facebook unveils security tools after Zuckerberg hack The two don’t appear to be connected, but they’re being connected online. The first new security measure involves expanding the use of HTTPS -- Hypertext Transfer Protocol Secure -- beyond password exchange