Looking for something else?
Security Token and Smart Card Technology News
February 16, 2017
Yubico founder and CEO Stina Ehrensvard spoke with SearchSecurity at RSAC 2017 about FIDO authentication and how Google uses it to secure logins and cut costs.
October 05, 2012
Microsoft has purchased the multifactor factor authentication platform vendor for an undisclosed amount.
June 07, 2011
Following a retooling of its manufacturing and supply chain management processes, RSA plans to replace security tokens for high risk customers.
June 02, 2011
Security pros advocate a reassessment of security processes and technologies in the wake of breaches that may be tied to RSA SecurID weaknesses.
Security Token and Smart Card Technology Get Started
Bring yourself up to speed with our introductory content
Two-factor authentication (2FA), often referred to as two-step verification, is a security process in which the user provides two authentication factors to verify they are who they say they are. Continue Reading
A key fob is a small, programmable hardware device that provides access to a physical object. Key fobs, are used to provide one-factor authentication for objects such as doors or automobiles. They are also used as an authentication factor for ... Continue Reading
A smart card is a device, often the size of a credit card, which includes an embedded microcontroller or memory chip and can securely process or store data. Continue Reading
Evaluate Security Token and Smart Card Technology Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Identity management is a core component of cybersecurity readiness, but there are many layers and complexities behind it. Expert Peter Sullivan explains the basics of IAM. Continue Reading
The banks and the retailers have divergent views on how best to secure credit card transactions. Will the courts decide between signatures and PINs? Or will market forces win out? Continue Reading
The terms two-step verification and two-factor authentication are used interchangeably, but do they differ from one another? Expert Michael Cobb explains. Continue Reading
Manage Security Token and Smart Card Technology
Learn to apply best practices and optimize your operations.
New guidance from the PCI SSC includes some essential aspects of tokenization security and what merchants need to know about tokenization products. Continue Reading
Expert Dave Shackleford says cloud tokenization technology is becoming an attractive alternative to cloud encryption, but problems persist. Continue Reading
Readers vote on the best digital identity verification products, services, and management systems, including PKI, hardware and software tokens, smart cards. Continue Reading
Problem Solve Security Token and Smart Card Technology Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Two-factor authentication systems require more than using codes sent through SMS and smart cards. Expert Michael Cobb explains how to properly and effectively implement 2FA. Continue Reading
Can FIDO Alliance standards bring biometrics to the masses? See 11 of the products that may represent the future of online authentication products. Continue Reading
What are the most common attacks against two-factor authentication, and how can you protect against them? Expert Nick Lewis weighs in. Continue Reading