Security Token and Smart Card Technology News
October 05, 2012
Microsoft has purchased the multifactor factor authentication platform vendor for an undisclosed amount.
June 07, 2011
Following a retooling of its manufacturing and supply chain management processes, RSA plans to replace security tokens for high risk customers.
June 02, 2011
Security pros advocate a reassessment of security processes and technologies in the wake of breaches that may be tied to RSA SecurID weaknesses.
April 27, 2011
In the wake of the RSA SecurID breach, a vendor survey finds a reduced level of confidence in the security provided by tokens.
Security Token and Smart Card Technology Get Started
Bring yourself up to speed with our introductory content
Active RFID (radio frequency identification) tags are continuously operating, battery-powered sensors that gather and transmit data to a reading device. Continue Reading
Two-factor authentication is a security process in which the user provides two means of identification, one of which is typically a physical token, such as a card, and the other of which is typically something memorized, such as a security code. Continue Reading
A soft token is a software-based security token that generates a single-use login PIN. Traditionally, a security token has been a hardware device that produces a new, secure and individual PIN for each use and displays it on a built-in LCD display. Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate Security Token and Smart Card Technology Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The terms two-step verification and two-factor authentication are used interchangeably, but do they differ from one another? Expert Michael Cobb explains. Continue Reading
Tokenization technology can be confusing. Expert Mike Chapple explains what the difference is between two types of tokens and how tokenization can help with PCI DSS compliance. Continue Reading
Expert Dave Shackleford says cloud tokenization technology is becoming an attractive alternative to cloud encryption, but problems persist. Continue Reading
Manage Security Token and Smart Card Technology
Learn to apply best practices and optimize your operations.
New guidance from the PCI SSC includes some essential aspects of tokenization security and what merchants need to know about tokenization products. Continue Reading
Readers vote on the best digital identity verification products, services, and management systems, including PKI, hardware and software tokens, smart cards. Continue Reading
If multifactor authentication is so great, why hasn't it replaced the password? Michael Cobb reviews the hype surrounding strong authentication. There are more drawbacks than you think. Continue Reading
Problem Solve Security Token and Smart Card Technology Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Can FIDO Alliance standards bring biometrics to the masses? See 11 of the products that may represent the future of online authentication products. Continue Reading
What are the most common attacks against two-factor authentication, and how can you protect against them? Expert Nick Lewis weighs in. Continue Reading
Tokens are no longer the only choice when it comes to OTPs and electronic identity verification. Learn about new two-factor authentication options involving SMS and mobile phones. Continue Reading