• December 22, 2014 22 Dec'14

    How does the safe harbor program affect COPPA compliance?

    The FTC's safe harbor program won't necessarily ease COPAA compliance requirements for enterprises. Expert Mike Chapple reviews the seven regulations the FTC will definitely enforce.  Continue Reading

  • December 22, 2014 22 Dec'14

    grid authentication

    Grid authentication is a method of ensuring that an end user is who he claims to be by requiring him to enter values from specific cells in a grid whose content should be only accessible to him and the service provider. Because the grid consists of ...  Continue Reading

  • December 22, 2014 22 Dec'14

    Researchers uncover serious NTP security flaws

    According to researchers, the most severe of several newly discovered Network Time Protocol security flaws can be exploited remotely with a single packet.  Continue Reading

  • December 20, 2014 20 Dec'14

    soft token

    A soft token is a software-based security token that generates a single-use login PIN. Traditionally, a security token has been a hardware device that produces a new, secure and individual PIN for each use and displays it on a built-in LCD display.  Continue Reading

  • December 20, 2014 20 Dec'14

    signature analysis

    Signature analysis has two meanings. It can involve scrutinizing human signatures in order to detect forgeries and it can be a troubleshooting technique in which an AC signal with a specific waveform is applied across a component.  Continue Reading

  • December 20, 2014 20 Dec'14

    risk-based authentication (RBA)

    Risk-based authentication (RBA) is a method of applying varying levels of stringency to authentication processes based on the likelihood that access to a given system could result in its being compromised. As the level of risk increases, the ...  Continue Reading

  • December 20, 2014 20 Dec'14

    out-of-band authentication

    Out-of-band authentication is a type of two-factor authentication that requires a secondary verification method through a separate communication channel along with the typical ID and password. Out-of-band authentication is often used in financial ...  Continue Reading

  • December 19, 2014 19 Dec'14

    Home router security vulnerability exposes 12 million devices

    Check Point has uncovered a widespread home router security vulnerability, dubbed Misfortune Cookie, that could allow attackers to gain control over millions of devices.  Continue Reading

  • December 19, 2014 19 Dec'14

    claims-based identity

    Claims-based identity is a means of authenticating an end user, application or device to another system in a way that abstracts the entity’s specific information while providing data that authorizes them for appropriate and relevant interactions.  Continue Reading

  • December 19, 2014 19 Dec'14

    FBI connects Sony Pictures hack to North Korean government

    The investigative U.S. government agency said it found overlap between the malware and infrastructure used in the Sony Pictures hack and other North Korean operations.  Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close