Tony Lauro, director of security technology and strategy at Akamai, discusses hardware security dongles and using phones to act as surrogates for them. You have to hand it to the cyber-thieves: They ...
The recent wave of highly public cyberattacks has cast a spotlight on last month’s White House executive order on cybersecurity, and the need for agencies to modernize their cybersecurity and ...
Joel Snyder, Ph.D., is a senior IT consultant with 30 years of practice. An internationally recognized expert in the areas of security, messaging and networks, Dr. Snyder is a popular speaker and ...
We independently review everything we recommend. When you buy through our links, we may earn a commission. Learn more› By Max Eddy Max Eddy is a writer who has covered privacy and security — including ...
With the rapid advancement of technology and the growing number of security threats, both physical and cyber, conventional methods of access control have become insufficient in ensuring the security ...
Google LLC has released a new open-source multifactor authentication security key platform that allows both hobbyists and hardware vendors to build their own security keys. Called OpenSK, the project ...