HackDig : Dig high-quality web security articles for hacker

The Untapped Potential of Two-Factor Authentication

Remote authentication traditionally depends on two factors: something the user knows, such as a password, and something the user has, such as a hardware token. This is called two-factor authentication (2FA). In practice, something that the entity knows typically serves as the primary method of authentication. Passwords have long reigned supreme because the
Publish At:2017-08-09 10:45 | Read:3265 | Comments:0 | Tags:Identity & Access Access Management Authentication Authentic

IBM Scores a Strong Performer Placement in Risk-Based Authentication Wave

We are proud to announce that Forrester named IBM a Strong Performer in its new report, “The Forrester Wave: Risk-Based Authentication, Q3 2017.” This is the first update to the Forrester Wave for Risk-Based Authentication (RBA) since Q1 2012, and IBM’s first time participating in the report as one of the eight most “significant provi
Publish At:2017-08-03 06:56 | Read:3561 | Comments:0 | Tags:Identity & Access Authentication Authentication Software For


Share high-quality web security related articles with you:)


Tag Cloud