authentication

Why cloud computing is key to help implement better security methods

The increase of cloud applications and number of Internet of Things (IoT) devices has led enterprises to re-evaluate their current…

IBM foresees biometric future driven by Millennials

IBM has revealed global consumer attitudes towards authentication and it turns out security is increasingly becoming a top priority for…

Authentication Explained

CBR: What is authentication? RL: Authentication is the process or action of verifying an entity, a way of determining whether…

Biometrics Fact or Fiction: The best authentication tech for the mobile-first world

We are seeing a biometrics boom across many industries, from banks deploying selfie biometrics to laptops requiring fingerprint authentication. As…

FIDO: How a secure authentication protocol could redefine online and IoT security

The Yahoo breach shows just how dangerous the old model of a centralised username and password database is: if a…

Data protection vs. authentication: Tackling the cloud security dilemma

Seemingly every week, a new report comes out revealing how little companies actually know about where their data is going.…