The protection of sensitive company networks and critical infrastructures is increasingly in focus, also in view of a tense security situation. In many cases, cyber security concepts currently in use are being put to the test.


More

The Economist: Where are the flaws in two-factor authentication?

The Economist reports that two-factor authentication methods using SMS or OTPs are flawed, and that…

Read More →

PC World: How Intel Core chips could take over two-factor authentication from your phone

Password manager Dashlane is taking advantage of a feature within Intel’s 8th-generation Core chips that…

Read More →

Science Friday Podcast: How To Make Spoof-Proof Biometric Security

On this episode of the Science Friday Podcast, Stephanie Schuckers, director of the Center for…

Read More →