Analysis: How FIDO Alliance might change authentication

Two-Factor and Multifactor Authentication Strategies

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Identity and access management final exam

    Find out how much you learned in Identity and Access Management Security School and the areas where you need to focus more attention. 

  • Secure user authentication: Regulations, implementation and methods

    When deploying any authentication option -- whether to comply with the FFIEC's two-factor authentication mandate or simply strengthen access controls -- businesses need to weigh several factors to decide which option best suits their needs. In this l... 

  • Authentication in the real world: Moving from strategy to implementation

    It's a common headache for security administrators. Management wants to roll out a strong authentication system across a heterogeneous IT environment. The biggest challenge is often effectively weaving an authentication plan into diverse directories,... 

  • How to create an optional login for the same application

    In this Q&A, application security expert Michael Cobb explains how to create optional logins for your applications. 

  • RFID tags: Do they have a secure future?

    RFID tags, an automatic identification method can be useful, but do they have a future? In this Identity Management and Access Control Ask the Expert Q&A, resident expert Joel Dubin explains how RFID tags work and discusses the future of this technol... 

  • Risk-based authentication

    The concept of risk-based authentication is becoming popular for some online business-to-consumer transactions, particularly those conducted with banks and other financial services firms. 

  • Identity and Access Management Services, Systems and Technologies

    Government regulations and the convenience of federated identities have made identity management and access control a priority for many enterprises. This Identity and Access Management Services, Systems and Technologies Security School explores criti... 

  • Strong authentication for businesses large and small

    Product review: Customer service could return calls more quickly when there's a problem. But overall, RSA SecurID Appliance 2.0 delivers robust, scalable protection. 

  • RSA Security may not be the 'pearl' EMC thinks it is

    Having outbid other suitors, EMC must now sell the purchase to its shareholders and make use of RSA's technology. Will the strategy work? The 451 Group isn't sure RSA is much of a gem. 

  • Report: EMC may be near deal to purchase RSA Security

    RSA Security has been looking for a buyer for several months, according to The New York Times, and its board of directors may accept an acquisition offer as soon as this weekend.