authentication
Why cloud computing is key to help implement better security methods
The increase of cloud applications and number of Internet of Things (IoT) devices has led enterprises to re-evaluate their current…
IBM foresees biometric future driven by Millennials
IBM has revealed global consumer attitudes towards authentication and it turns out security is increasingly becoming a top priority for…
Authentication Explained
CBR: What is authentication? RL: Authentication is the process or action of verifying an entity, a way of determining whether…
Biometrics Fact or Fiction: The best authentication tech for the mobile-first world
We are seeing a biometrics boom across many industries, from banks deploying selfie biometrics to laptops requiring fingerprint authentication. As…
FIDO: How a secure authentication protocol could redefine online and IoT security
The Yahoo breach shows just how dangerous the old model of a centralised username and password database is: if a…
Data protection vs. authentication: Tackling the cloud security dilemma
Seemingly every week, a new report comes out revealing how little companies actually know about where their data is going.…