With no shortage of cybersecurity risks in state and local government, state CIOs expect enterprise identity and access management solution adoption or expansion to be the cybersecurity initiative ...
Device code phishing abuses the OAuth device flow, and Google and Azure produce strikingly different attack surfaces. Register for Huntress Labs' Live Hack to learn about attack techniques, defensive ...
An advisory from the U.S. National Security Agency provides Microsoft Azure administrators guidance to detect and protect against threat actors looking to access resources in the cloud by forging ...
Microsoft has outlined several mitigations to protect against attacks on multi-factor authentication that will unfortunately make life more difficult for your remote workers. Three years ago, attacks ...
As Entrust Inc. enters the hardware token market selling tiny one-time password (OTP) tokens at $5 each, analysts say the vendor's entry into the market could drive down prices across the board. RSA ...
The U.S. Army’s wearable authentication tokens intended for the tactical environment could be used for nontactical purposes, such as accessing strategic-level systems, enterprise networks and medical ...
ROCHESTER, N.Y.--(BUSINESS WIRE)--Token, a revolutionary provider of secure, wearable authentication solutions, today announced that the company has begun production of its smart ring in the United ...
Army Futures Command is working on a wearable identity token that will replace the Common Access Card (CAC) for connecting soldier laptops and other handheld devices to the service's future tactical ...