A Bluetooth token thwarts man-in-the-middle attacks
The OAuth token is a new standard in authentication
An SMS token eases the authentication processes
Numerous third-party MFA tokens available
Keypad authentication an example of a hardware token
Smartphone token authentication
A grid token provides an extra layer of authentication security
Key fobs generate one-time authentication passwords
Software tokens spurred multifactor authentication innovation
Thin credit card token convenient for authentication
Password problems plaguing you? FIDO Alliance hopes to have the answers
Two-factor authentication devices: One key to rule them all
Iris authentication: What is your eye-dentity?
Voice recognition: Can you hear me now?
Can a fingerprint sensor make a smartphone smarter?
BYOB: Bring your own biometric key fob, that is
Beyond passwords and PINs: Fingerprint sensors for the mobile age
Smart TV, smart boxes, smart remote -- smart mouse?
Secure element, secure NFC, secure mobility
FIDO authentication for Windows, Linux and Android
Secure automatic login; just swipe your finger
Too old for fingerprint authentication? Think again
XSS vulnerabilities? Time for a visit to the security control library
How five common Web application vulnerabilities surface, get exploited
Got insecure direct object references? Be random, unpredictable
How to resolve SQL injection vulnerabilities? Trust no one!
Don't overlook that Web application infrastructure
Web application session management issues, and how to avoid a hijacking
Mobile app security
Mobile device security risks
Mobile security project priorities
Mobile device security policy
Survey demographics and methodology
BYOD survey data analysis
Introduction: Mobile security survey 2012 audio slideshow
Top mobile security concerns