RSA responds to SecurID attack, plans token replacement

Security Token and Smart Card Technology

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Deep dive into authentication methods and best practices

    Is your token authentication vulnerable to exploit or attack? In this handbook, discover how to lock down two-factor authentication methods in the enterprise. Then, we look at authentication methods such as two-factor tokens, biometrics and cloud-ba... 

  • An expert guide to tokenization and using it effectively

    Access this month’s issue to uncover the latest tokenization trends (including, payment card data security, tokenization as a service, as well as protecting PII data) and explore how this revived technology not only offers enhanced data protection, b... 

  • Best Authentication Products 2011

    Readers vote on the best digital identity verification products, services, and management systems, including PKI, hardware and software tokens, smart cards. 

  • Understanding tokenization amid PCI encryption requirements

    This mini learning guide offers a brief introduction to tokenization technology, as well as PCI DSS encryption requirements. Learn more about the future of tokenization and how the technology may help to ease PCI DSS compliance burdens. 

  • Quiz: Next-generation authentication

    A five-question multiple-choice quiz to test your understanding of the content presented by expert Mark Diodati in this lesson of SearchSecurity.com's Identity and Access Management Security School. 

  • Future authentication technologies: How to choose the right product

    In this lesson in SearchSecurity.com's Identity and Access Management Security School, Burton Group's Mark Diodati explores innovative and cost-effective user-based authentication technologies. 

  • Spy vs. Spy

    Excerpt from Chapter 6 of Spies Among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day. 

  • Lesson/Domain 2 -- Security School: Training for CISSP Certification

    SearchSecurity.com Security School webcasts are focused on CISSP training. Each lesson corresponds to a specific domain in the CISSP exam's "Common Body of Knowledge." 

  • Infosec Know IT All Trivia: Authentication

    Test your knowledge of authentication methods with our Infosec Know IT All Trivia. 

  • GPS navigation system

    A GPS navigation system is a GPS receiver and audio/video (AV) components designed for a specific purpose such as a car-based or hand-held device or a smartphone app. The global positioning system (GPS) is a 24-satellite navigation system that uses m... 

  • one-time password (OTP)

    A one-time password (OTP) is an automatically generated numeric or alphanumeric string of characters that will authenticate the user for a single transaction or session. 

  • smart label

    A smart label is a slip of paper, plastic or other material on a product that contains an RFID tag in addition to bar code data. 

  • tokenization

    Tokenization is the process of replacing sensitive data with unique identification symbols that retain all the essential information about the data without compromising its security. 

  • national identity card

    A national identity card is a portable document, typically a plasticized card with digitally-embedded information, that someone is required or encouraged to carry as a means of confirming their identity. Since the World Trade Center tragedy of Septe... 

  • authentication server

    An authentication server is an application that facilitates authentication of an entity that attempts to access a network...(Continued) 

  • key string

    A key string is the authentication code included in each key in a key chain, which is a series of keys that can be created to help ensure secure communication between routers in a network. 

  • key chain

    A key chain is a series of keys that can be created to help ensure secure communication between routers in a network. Authentication occurs whenever neighboring routers exchange information. Plain text authentication sends a plain text key with each ... 

  • Chameleon Card

    The Chameleon Card is a programmable card in development at Chameleon Network that can represent each of the owner's credit, debit, and customer cards as required, making it unnecessary to carry all of the aforementioned. 

  • two-factor authentication

    Two-factor authentication is a security process in which the user provides two means of identification, one of which is typically a physical token, such as a card, and the other of which is typically something memorized, such as a security code. 

  • See more Definitions on Security Token and Smart Card Technology
About Security Token and Smart Card Technology

Get tips on how to use security tokens and smart card technology for secure user authentication. This resource defines what a smart card is, and provides information on deployment, smart card writers and readers and software.