The protection of sensitive company networks and critical infrastructures is increasingly in focus, also in view of a tense security situation. In many cases, cyber security concepts currently in use are being put to the test.


More

J’ai Un Pote Dans La Com: MFA, Real Alternative to Physical Security Tokens?

Op-ed from Ping Identity around the limits of security tokens and the generalization of the…

Read More →

PhonAndroid: 3.2bn Hacked Login and Passwords Have Leaked: Check if Your Email is Part of It

This article discusses the COMB breach with some tips and advice to secure your identity…

Read More →

Raconteur: Holding Customers Accountable for Authentication

Andrew Shikiar, executive director at FIDO Alliance, a global consortium working on the creation of…

Read More →