Authentication

Authentication | News, how-tos, features, reviews, and videos

binary eye circuits
CSO > Password elimination [conceptual password security lock in a trash bin]

blockchain crypotocurrency bitcoin by olgasalt getty

10 top distributed apps (dApps) for blockchain

These distributed apps are resilient and enable everything from asset tracking to identity verification — oh, and some pretty cool role-playing games, too.

Digitizing stylus input via tablet  >  writing / drawing / signatures

NHTSA odometer disclosure rule might pave way for e-signature authentication

The Final Rule allows flexibility in the technology they use to digitally verify identity through electronic signatures, including a pen pad or biometrics.

Admission tickets in an digital network / access / admittance / authorization / authentication

What is OAuth? How the open authorization framework works

OAuth is an open-standard authorization protocol or framework that describes how unrelated servers and services can safely allow authenticated access to their assets. It is widely accepted, but be aware of its vulnerabilities.

Multi-factor authentication (MFA) / two-factor authentication (2FA) / one-time security code

2fa explained: How to enable it and how it works

Two-factor authentication (2fa) is a method of establishing access to an online account or computer system that requires the user to provide two different types of information. It can boost security for anyone using any kind of online...

access control / authentication / privileges / managing permissions

What is access control? A key component of data security

Access control is a method of guaranteeing that users are who they say they are and that they have the appropriate access to company data. It is a vital aspect of data security, but it has some significant enforcement challenges.

CSO  >  Digital identity  >  personal identity / recognition + access authentication / personal data

Taxpayer First Act: Improving identity verification and modernizing the IRS

With citizens' PII at risk, some federal agencies like the IRS are moving away from knowledge-based verification. It's time for them all to follow suit.

digital fingerprint / binary code

Companies with zero-trust network security move toward biometric authentication

According to new research, more companies are enabling biometric authentication on devices to verify access requests.

security display showing  biometric processing

What is biometrics? 10 physical and behavioral identifiers that can be used for authentication

Biometrics are physical or behavioral human characteristics to that can be used to digitally identify a person to grant access to systems, devices or data. It has the potential to make authentication dramatically faster, easier and...

passwords / authentication

12 famous passwords used through the ages

Passwords seem like a recent thing, but they've been in use for a long time. Here are a dozen of the more memorable ones.

login password - user permissions - administrative control

Using a password manager: 7 pros and cons

This veteran security pro feels more secure now that he's using a password manager, but there are still risks.

Facebook / privacy / security / breach / wide-eyed fear

Hey Facebook: Quit discouraging people from using 2FA

Facebook is spying on user 2FA phone numbers to target them with ads. A non-trivial percentage of Facebook users will not use two-factor authentication as a result, a net loss to security.

woman phone scam

4 scams that illustrate the one-way authentication problem

These scams rely on tricking consumers into believing they are interacting with a trusted vendor. Here’s how vendors can prevent the scams.

user authentication

How to evaluate web authentication methods

Authentication evaluation white paper includes popular and obscure methods and outlines a framework for assessing their security effectiveness.

Load More
Recommended for You