Identity management is coming to the Internet of Things

IoT-and-security-as-gears

The security of IoT Devices matters. If we’re to actually live in a world where we reap the full potential from Internet-connected devices, those devices will need to be reasonably secured. Device makers will need to take the secure design and development of their gear seriously. Device owners, meanwhile, will have to take the effective […]

What does Microsoft’s move mean for passwords?

password-on-laptop

The FIDO Alliance (Fast Identity Online Alliance) recently awarded Microsoft Hello, Microsoft’s Windows facial recognition system, FIDO2 certification. With this certification, Windows devices can use biometrics — such as facial recognition, fingerprint, or FIDO2 security keys — to authenticate to devices. While this news is Microsoft focused, it’s part of a broader push to depreciate […]

DDoS attacks grow more popular, targeted

several-darts-in-bullseye

A new State of the Internet/Security: Web Attack report finds the number of distributed denial of service attacks to be growing, already up 16 percent over all of last year. The report also found that Russia and China are initiating the most credential-based attacks against the hospitality industry. The report proved records are made to be […]

Biometrics (finally) gaining widespread acceptance

full-hand-biometric-scanning

It’s time for passwords to die, they said. Passwords are antiquated and don’t provide the level of security needed, they said. This was the marketing mantra of many an authentication and identity management vendor — 20 years ago. Of course, then, passwords were not on their way out. They were still on their way up. […]

Carriers collaborating to improve mobile security

Mobile-Parts

One of the biggest challenges for enterprise IT managers today is securing mobile devices. While the major obstacles to mobile security (as all IT pros know) are users, technology vulnerabilities also play a part in making mobile devices a risk to enterprise networks and data. That’s because users often are forced to jump through multiple […]

Cool security tools your mobile workers just might use

As any IT professional knows, enterprise mobile workers typically aren’t as security conscious as, well, IT professionals. Understandable to be sure, but vexing nonetheless! Poor security practices — ranging from losing mobile devices to failing to use encryption on public Wi-Fi networks — can result in data loss and theft, brand damage, compliance penalties and more. […]