As promised last issue, I’m re-printing a glossary of strong/second factor authentication methods that TriCipher provided me along with the results of its sponsored survey on people’s perceptions of ...
The Kerberos authentication method originated at the Massachusetts Institute of Technology in the 1980s, as part of a project called Athena. The project involved integrating the computers on the MIT ...
In the network access control products we tested, authentication varies from very strong to very weak, and every point in-between. When starting down your path of evaluating NAC products, decide very ...
In today’s digital age, personal data is never safe. Cybercriminals are looking for every opportunity possible to acquire your user data. Ongoing data breaches continue to expose usernames, passwords, ...
Compare the best multi-factor authentication software in 2026. See which MFA tools offer adaptive security, easy setup, and real customer identity protection.
Microsoft will roll out passkey support for phishing-resistant passwordless authentication to Microsoft Entra‑protected ...