The FIDO authentication standard could eventually bypass passwords, or at least augment them, as government and industry turns to more effective authentication technologies.
In the market to buy digital certificates? Learn exactly how digital certificates work, which features are key and how to evaluate the available options on the market.
Two-factor authentication systems require more than using codes sent through SMS and smart cards. Expert Michael Cobb explains how to properly and effectively implement 2FA.
Researchers found that facial recognition systems can be bypassed with 3D models. Expert Nick Lewis explains how these spoofing attacks work and what can be done to prevent them.
There are some MongoDB security issues that have yet to be resolved. Expert Matthew Pascucci discusses the risks and how to protect your enterprise from them.
About This E-Newsletter This email is published by the TechTarget Security Media Group. Copyright 2017 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.
To unsubscribe from all Security Media Group emails, Go to unsubscribe.
TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466 Contact: webmaster@techtarget.com
When you access content from this email, your information may be shared with the sponsors of that content as described in our Privacy Policy.
About TechTarget: TechTarget publishes media for IT pros with more than 100 focused websites providing quick access to a deep store of news, advice and analysis about the technologies, products and processes crucial to your job.
No comments:
Post a Comment