Security News

How to combine SSH key authentication and two-factor authentication on Linux
2018-04-19 15:02

Jack Wallen shows you how to set up both two-factor authentication and SSH key authentication for a rock-solid remote login of your Linux servers.

Passwordless enterprise authentication on Windows 10 and Azure AD
2018-04-17 12:16

Yubico announced that the new Security Key by Yubico supporting FIDO2 will be supported in Windows 10 devices and Microsoft Azure Active Directory (Azure AD). The feature is currently in limited...

How to set up two-factor authentication on CentOS 7
2018-04-12 17:16

Once you have CentOS 7 up and running, you'll want to lock down that server with two-factor authentication. Every administrator should consider enabling this additional layer of security.

Enhanced FIDO Authentication Standard Expands to the Browser
2018-04-11 20:01

A new version of the FIDO authentication standard is designed to enable the elimination of passwords for a broader range of devices, says Phil Dunkelberger, CEO of Nok Nok Labs, who describes the...

New Authentication Standard Coming to Major Web Browsers
2018-04-11 14:09

Web browsers from Google, Microsoft, and Mozilla will soon provide users with a new, password-less authentication standard built by the FIDO Alliance and the World Wide Web Consortium (W3C) and...

Practical passwordless authentication comes a step closer with WebAuthn
2018-04-10 18:48

Microsoft, Mozilla, and Google are all implementing the new standard.

Authentication Bypass Vulnerability Found in Auth0 Identity Platform
2018-04-07 18:06

A critical authentication bypass vulnerability has been discovered in one of the biggest identity-as-a-service platform Auth0 that could have allowed a malicious attacker to access any portal or...

Taking Friction out of Authentication
2018-04-05 17:49

Evan O'Regan of Entrust Datacard on Orchestrating a Frictionless ExperienceTraditional approaches to authentication can't work effectively in a digital environment where customers and partners are...

Why do we need a risk-based approach to authentication?
2018-02-15 13:30

20 years ago, everyone worked at a desktop workstation hardwired into an office building. This made network security simple and organizations felt they could depend on the time-tested method of...

Authentication today: Moving beyond passwords
2018-01-29 12:51

A new global study from IBM Security examining consumer perspectives around digital identity and authentication, found that people now prioritize security over convenience when logging into...