Op-ed from Ping Identity around the limits of security tokens and the generalization of the use of the smartphone as a security tool. It should be noted that other equipment, such as computers complying with the new FIDO standard and integrating biometric functions such as Windows Hello or Apple TouchID, which are increasingly present on the market, can also be used as trusted devices in a strong authentication solution, in addition to smartphones.


More

PYMNTS: Entersekt and Stanchion Team to Enhance Payment Integration

Authentication software company Entersekt has launched a partnership with South Africa-based PayTech solution provider Stanchion. The partnership is…

Read More →

Info Security Buzz: From Passwords to Passkeys: The Future of Digital Identity Protection

Passwords have been used as the first line of defense in protecting one’s digital identity,…

Read More →

Business Review: NETOPIA Payments launches Click to Pay: a simpler, faster, and more secure online payment experience

NETOPIA Payments becomes the first online payment processor in the world to implement Click to…

Read More →