The protection of sensitive company networks and critical infrastructures is increasingly in focus, also in view of a tense security situation. In many cases, cyber security concepts currently in use are being put to the test.


More

IT-Zoom: The Passwordless Decade Begins

Authentication via password is neither convenient nor secure. Access technologies that actually manage without a…

Read More →

TEISS: SMS Authentication: why it’s bad (and what to do instead)

Twitter’s Account Security Report shows users still opt for SMS authentication. Andrew Shikiar at the…

Read More →

Global Security Mag: Technology protect against phishing, not training

A byline from by Andrew Shikiar, Executive Director of the FIDO Alliance on the cyber risks…

Read More →