Premium Content

Access "Figuring out FIDO as the first products emerge"

Issue Overview

Information Security magazine - May 2014 Vol. 16 / No. 4

The Fast Identity Online (FIDO) standards reached the public draft stage in February, and the first deployments of FIDO-ready technologies followed in April. As industry players such as Google, Microsoft and RSA work on stronger authentication methods that strive to keep personally identifiable information on the client, how will the evolution of two-factor authentication affect enterprise technologies? We look at the security implications of the open FIDO specifications and a range of emerging FIDO-ready technologies that can help security professionals track key developments as adoption of password-free authentication moves a step closer.

We also report on the evolving roles of CISOs after the Target breach, and renewed calls for federal legislation on data collection and breach notification. Columnist Marcus Ranum interviews Georgia Weidman about pen testing and network compromise.  Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Threat intelligence and risk: Why cybersecurity hangs in the balance
    ISM_0614.png
    E-Zine

    As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above ...

  • How to respond to the latest distributed denial-of-service attacks
    DDOS_attacks.png
    E-Handbook

    All indications show that DDoS attacks are increasing in variety, number and size. No network system is immune and information security pros can't ...

  • Secure file transfer: Send large files fast, but keep your system safe
    secure_file_transfer.png
    E-Handbook

    FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-ins is real. This guide to secure ...