New & Notable
Looking for something else?
Security Token and Smart Card Technology News
October 05, 2012
Microsoft has purchased the multifactor factor authentication platform vendor for an undisclosed amount.
June 07, 2011
Following a retooling of its manufacturing and supply chain management processes, RSA plans to replace security tokens for high risk customers.
June 02, 2011
Security pros advocate a reassessment of security processes and technologies in the wake of breaches that may be tied to RSA SecurID weaknesses.
April 27, 2011
In the wake of the RSA SecurID breach, a vendor survey finds a reduced level of confidence in the security provided by tokens.
Security Token and Smart Card Technology Get Started
Bring yourself up to speed with our introductory content
GPS tracking is the surveillance of location through use of the Global Positioning System (GPS ) to track the location of an entity or object remotely. The technology can pinpoint longitude, latitude, ground speed, and course direction of the target. Continue Reading
Can FIDO Alliance standards bring biometrics to the masses? See 11 of the products that may represent the future of online authentication products. Continue Reading
A soft token is a software-based security token that generates a single-use login PIN. Traditionally, a security token has been a hardware device that produces a new, secure and individual PIN for each use and displays it on a built-in LCD display.... Continue Reading
Evaluate Security Token and Smart Card Technology Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert Dave Shackleford says cloud tokenization technology is becoming an attractive alternative to cloud encryption, but problems persist. Continue Reading
Readers choose the best authentication products. Continue Reading
Most infosec pros agree that smart cards create a higher level of enterprise security than passwords alone. Learn how to weigh the pros and cons of smart cards to know if they're right for your enterprise? Continue Reading
Manage Security Token and Smart Card Technology
Learn to apply best practices and optimize your operations.
Readers vote on the best digital identity verification products, services, and management systems, including PKI, hardware and software tokens, smart cards. Continue Reading
If multifactor authentication is so great, why hasn't it replaced the password? Michael Cobb reviews the hype surrounding strong authentication. There are more drawbacks than you think. Continue Reading
If your organization is serious about managing risk and total asset protection, then physical-logical convergence is a necessary step. Continue Reading
Problem Solve Security Token and Smart Card Technology Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
What are the most common attacks against two-factor authentication, and how can you protect against them? Expert Nick Lewis weighs in. Continue Reading
Tokens are no longer the only choice when it comes to OTPs and electronic identity verification. Learn about new two-factor authentication options involving SMS and mobile phones. Continue Reading
Is it possible to track a lost or stolen smart card with GPS? In this IAM expert response, Randall Gamby gives advice on enhancing smart card security in such a situation. Continue Reading